Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,134,448 papers from all fields of science
Search
Sign In
Create Free Account
Cache pollution
Cache pollution describes situations where an executing computer program loads data into CPU cache unnecessarily, thus causing other useful data to…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
17 relations
AltiVec
CPU cache
Computer program
Locality of reference
Expand
Broader (3)
Cache (computing)
Computer architecture
Computer memory
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Cache isolation for virtualization of mixed general-purpose and real-time systems
Ruhui Ma
,
W. Ye
,
Alei Liang
,
Haibing Guan
,
Jian Li
Journal of systems architecture
2013
Corpus ID: 1790113
Review
2013
Review
2013
Watershed Agricultural Non-Point Source Pollution Management
Yi-cheng Fu
,
B. Ruan
,
Ting Gao
2013
Corpus ID: 41281515
A growing focus on nutrient transfers from agricultural lands to watershed has served to accelerate our understanding of the…
Expand
2011
2011
Host-compiled multicore RTOS simulator for embedded real-time software development
Parisa Razaghi
,
A. Gerstlauer
Design, Automation and Test in Europe
2011
Corpus ID: 17349578
With increasing demand for higher performance under limited power budgets, multicore processors are rapidly becoming the norm in…
Expand
2009
2009
Improvement of the neural network proxy cache replacement strategy
H. ElAarag
,
Sam Romano
Spring Simulation Multiconference
2009
Corpus ID: 10889338
As the Internet has become a more central aspect for information technology, so have concerns with supplying enough bandwidth and…
Expand
2007
2007
7.1.4 Coping With System Integration Challenges in Large Complex Environments
G. Muller
2007
Corpus ID: 16405761
The increasing scope of systems integration poses many challenges for the system integrators. This paper contends that in…
Expand
2006
2006
Lightweight, pollution-attack resistant multicast authentication scheme
Ya-Jeng Lin
,
S. Shieh
,
W. Lin
ACM Asia Conference on Computer and…
2006
Corpus ID: 5060382
Authentication is an important security measure for multicast applications, providing receivers with confidence that the packets…
Expand
2005
2005
Storage-based intrusion detection for storage area networks (SANs)
M. Banikazemi
,
D. Poff
,
B. Abali
IEEE Conference on Mass Storage Systems and…
2005
Corpus ID: 1062914
Storage systems are the next frontier for providing protection against intrusion. Since storage systems see changes to persistent…
Expand
2005
2005
Analyzing NIC Overheads in Network-Intensive Workloads
N. Binkert
,
Lisa R. Hsu
,
A. Saidi
,
R. Dreslinski
,
Andrew L. Schultz
,
S. Reinhardt
2005
Corpus ID: 9292779
Modern high-bandwidth networks place a significant strain on host I/O subsystems. However, despite the practical ubiquity of TCP…
Expand
2003
2003
A Gaussian Probability Accelerator for SPHINX 3
B. Mathew
,
A. Davis
,
Zhen Fang
2003
Corpus ID: 489484
Accurate real-time speech recognition is not currently possible in the mobile embedded space where the need for natural voice…
Expand
1996
1996
Video-on-demand services: Efficient transportation and decompression of variable bit rate video
W. Feng
1996
Corpus ID: 60996502
Digital video compression techniques, such as the Motion-JPEG and MPEG compression standards, greatly reduce the network and…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE