Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,333,163 papers from all fields of science
Search
Sign In
Create Free Account
Code segment
Known as:
.text
, Text
, Text segment
In computing, a code segment, also known as a text segment or simply as text, is a portion of an object file or the corresponding section of the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
29 relations
"Classic" Mac OS
.bss
Computer architecture
Data segment
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Energy efficient middleware: Design and development for mobile applications
Fatimah Abdualaziz Almusalli
,
Noor Zaman Jhanjhi
,
R. Rasool
International Conference on Advanced…
2017
Corpus ID: 21230702
Over the recent years, the popularity of smartphones has increased dramatically. The advanced integrated technology in…
Expand
2014
2014
CTA-aware Prefetching for GPGPU
Hyeran Jeon
,
Gunjae Koo
,
M. Annavaram
2014
Corpus ID: 7297217
In this paper, we propose a thread group-aware stride prefetching scheme for GPUs. GPU kernels group threads into cooperative…
Expand
2013
2013
A Workload Model Based Approach to Evaluate the Robustness of Real-time Operating System
Zhengmao Zhou
,
Yun Zhou
,
Ming Cai
,
Lei Sun
IEEE 10th International Conference on High…
2013
Corpus ID: 17931542
An important step in the development of real-time operating system (RTOS) is the validation of its fault tolerance properties…
Expand
2010
2010
An Efficient Technique for Text Compression
M. Abul
,
Kalam Azad
,
R. Sharmeen
,
S. Ahmad
,
S. Kamruzzaman
arXiv.org
2010
Corpus ID: 948922
For storing a word or the whole text segment, we need a huge storage space. Typically a character requires 1 Byte for storing it…
Expand
Review
2007
Review
2007
Automated IT service fault diagnosis based on event correlation techniques
A. Hanemann
2007
Corpus ID: 11658513
In the previous years a paradigm shift in the area of IT service management could be witnessed. IT management does not only deal…
Expand
2005
2005
Security of memory allocators for C and C
Yves Younan
,
W. Joosen
,
F. Piessens
,
Hans Van den Eynden
2005
Corpus ID: 14298468
Most memory allocators ignore security issues. Instead they focus on maximizing performance and limiting fragmentation and waste…
Expand
2001
2001
Annotation-Based Diagrams for Shared-Data Concurrency
E. Newman
,
Aaron Greenhouse
,
W. Scherlis
2001
Corpus ID: 16338585
In languages such as Java and Ada, there are a number of significant concurrency-related design decisions that may not be…
Expand
2000
2000
Security agility for dynamic execution environments
Timothy Fraser
,
M. Petkac
,
Lee Badger
Proceedings DARPA Information Survivability…
2000
Corpus ID: 54164538
The evolution of dynamic execution environments increasingly requires security policies that are also dynamic in nature to…
Expand
1998
1998
Specifying the Didactic Design of Educational Multimedia and Telematics Applications
R. Koper
1998
Corpus ID: 60694833
Koper, E.J.R. (1998). Specifying the Didactic Design of Educational Multimedia and Telematics Applications. Journal of Computer…
Expand
1993
1993
Predicting Instruction Cache Behavior
F. Mueller
,
D. Whalley
,
M. Harmon
ACM-SIGPLAN Symposium on Programming Language…
1993
Corpus ID: 5698186
Assignment 2: Instruction Set Architecture, Performance and Other ISAs. Required Assignment 7: Hazard,Branch Prediction, Register…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE