Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,224,150 papers from all fields of science
Search
Sign In
Create Free Account
Code segment
Known as:
.text
, Text
, Text segment
In computing, a code segment, also known as a text segment or simply as text, is a portion of an object file or the corresponding section of the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
29 relations
"Classic" Mac OS
.bss
Computer architecture
Data segment
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
CTA-aware Prefetching for GPGPU
Hyeran Jeon
,
Gunjae Koo
,
M. Annavaram
2014
Corpus ID: 7297217
In this paper, we propose a thread group-aware stride prefetching scheme for GPUs. GPU kernels group threads into cooperative…
Expand
2013
2013
A Power-Aware Multi-Level Cache Organization Effective for Multi-Core Embedded Systems
A. Asaduzzaman
Journal of Computers
2013
Corpus ID: 5920242
Recent system design trends suggest multicore architecture for all computing platforms including distributed and embedded systems…
Expand
2012
2012
Investigating Usage of Text Segmentation and Inter-passage Similarities to Improve Text Document Clustering
Shashank Paliwal
,
Vikram Pudi
IAPR International Conference on Machine Learning…
2012
Corpus ID: 39829741
Measuring inter-document similarity is one of the most essential steps in text document clustering. Traditional methods rely on…
Expand
2010
2010
An Efficient Technique for Text Compression
M. Abul
,
Kalam Azad
,
R. Sharmeen
,
S. Ahmad
,
S. Kamruzzaman
arXiv.org
2010
Corpus ID: 948922
For storing a word or the whole text segment, we need a huge storage space. Typically a character requires 1 Byte for storing it…
Expand
Review
2007
Review
2007
Automated IT service fault diagnosis based on event correlation techniques
A. Hanemann
2007
Corpus ID: 11658513
In the previous years a paradigm shift in the area of IT service management could be witnessed. IT management does not only deal…
Expand
2005
2005
Security of memory allocators for C and C
Yves Younan
,
W. Joosen
,
F. Piessens
,
Hans Van den Eynden
2005
Corpus ID: 14298468
Most memory allocators ignore security issues. Instead they focus on maximizing performance and limiting fragmentation and waste…
Expand
2001
2001
Annotation-Based Diagrams for Shared-Data Concurrency
E. Newman
,
Aaron Greenhouse
,
W. Scherlis
2001
Corpus ID: 16338585
In languages such as Java and Ada, there are a number of significant concurrency-related design decisions that may not be…
Expand
1999
1999
Dynamically scheduling the trace produced during program execution into VLIW instructions
A. D. Souza
,
P. Rounce
Proceedings 13th International Parallel…
1999
Corpus ID: 11877801
VLIW machines possibly provide the most direct way to exploit instruction level parallelism; however, they cannot be used to…
Expand
1998
1998
Specifying the Didactic Design of Educational Multimedia and Telematics Applications
R. Koper
1998
Corpus ID: 60694833
Koper, E.J.R. (1998). Specifying the Didactic Design of Educational Multimedia and Telematics Applications. Journal of Computer…
Expand
1993
1993
Predicting Instruction Cache Behavior
F. Mueller
,
D. Whalley
,
M. Harmon
ACM-SIGPLAN Symposium on Programming Language…
1993
Corpus ID: 5698186
Assignment 2: Instruction Set Architecture, Performance and Other ISAs. Required Assignment 7: Hazard,Branch Prediction, Register…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE