Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,270,937 papers from all fields of science
Search
Sign In
Create Free Account
Hot spot (computer programming)
Known as:
Hot spot (computer science)
, Hotspot (computer science)
A hot spot in computer science is most usually defined as a region of a computer program where a high proportion of executed instructions occur or…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
17 relations
Comment (computer programming)
Compiler
Computer program
Computer science
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
A novel hardware Trojan design based on one-hot code
Di Wang
,
Liji Wu
,
Xiangmin Zhang
,
Xingjun Wu
International Symposium on Digital Forensics and…
2018
Corpus ID: 24785673
Hardware Trojan research has become an important research topic in recent time since the increased awareness of hardware security…
Expand
2013
2013
Modeling virtual machines misprediction overhead
D. C. S. Lucas
,
R. Auler
,
Rafael Dalibera
,
S. Rigo
,
E. Borin
,
G. Araújo
IEEE International Symposium on Workload…
2013
Corpus ID: 13243929
Virtual machines are versatile systems that can support innovative solutions to many problems. These systems usually rely on…
Expand
2012
2012
A Self-Checking Approach for SEU/MBUs-Hardened FSMs Design Based on the Replication of One-Hot Code
Liang Yuanqing
,
Yao Su-ying
,
Xu Jiangtao
,
Gao Jing
IEEE Transactions on Nuclear Science
2012
Corpus ID: 21766466
As technology scales, the protection of Finite State Machines' (FSMs) states against single event upset (SEU) and multiple bit…
Expand
2012
2012
A Selective Ahead-Of-Time Compiler on Android Device
Yeong-Kyu Lim
,
S. Parambil
,
Cheong-Ghil Kim
,
See-Hyung Lee
International Conference on Information Science…
2012
Corpus ID: 14876809
The runtime environment of Android is based on its own Java Virtual Machine(JVM) called Dalvik Virtual Machine (DVM) which is…
Expand
2010
2010
Software Managed Instruction Scratchpad Memory Optimization in Stream Architecture Based on Hot Code Analysis of Kernels
Yi He
,
Ju Ren
,
M. Wen
,
Qianming Yang
,
N. Wu
,
Chunyuan Zhang
13th Euromicro Conference on Digital System…
2010
Corpus ID: 8986453
Stream processors, such as Imagine, GPGPUs, FT64 and MASA, typically uses software managed scratchpad instruction memory which…
Expand
2010
2010
Embarking on the road of Intrusion Detection , with Erlang
I. A. Letia
,
D. Marian
2010
Corpus ID: 15863299
338 Abstract — Intrusion detection techniques are indispensable for the security infrastructure in order to detect threats before…
Expand
2009
2009
Functional programming at Facebook
Chris Piro
,
Eugene Letuchy
CUFP '09
2009
Corpus ID: 21974019
We use Erlang, ML, and Haskell for a few small projects but (as I'm sure you guessed) we'd like to focus on the lessons we've…
Expand
2009
2009
Architecture Independent Characterization of Embedded Java Workloads
Aniruddha Desai
,
Jugdutt Singh
IEEE computer architecture letters
2009
Corpus ID: 3011288
This paper presents architecture independent characterization of embedded Java workloads based on the industry standard…
Expand
2001
2001
Building Modern Distributed Systems
L. Pautet
,
Thomas Quinot
,
S. Tardieu
International Conference on Reliable Software…
2001
Corpus ID: 15118134
Ada 95 has been the first standardized language to include distribution in the core language itself. However, the set of features…
Expand
2000
2000
Executing an RTOS on Simulated Hardware using Co-verification
David Harris
2000
Corpus ID: 15229314
Hardware software co-verification tools allow a designer to run software against a hardware design before a prototype has been…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE