Skip to search formSkip to main contentSkip to account menu

Hot spot (computer programming)

Known as: Hot spot (computer science), Hotspot (computer science) 
A hot spot in computer science is most usually defined as a region of a computer program where a high proportion of executed instructions occur or… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Hardware Trojan research has become an important research topic in recent time since the increased awareness of hardware security… 
2013
2013
Virtual machines are versatile systems that can support innovative solutions to many problems. These systems usually rely on… 
2012
2012
As technology scales, the protection of Finite State Machines' (FSMs) states against single event upset (SEU) and multiple bit… 
2012
2012
The runtime environment of Android is based on its own Java Virtual Machine(JVM) called Dalvik Virtual Machine (DVM) which is… 
2010
2010
Stream processors, such as Imagine, GPGPUs, FT64 and MASA, typically uses software managed scratchpad instruction memory which… 
2010
2010
338 Abstract — Intrusion detection techniques are indispensable for the security infrastructure in order to detect threats before… 
2009
2009
We use Erlang, ML, and Haskell for a few small projects but (as I'm sure you guessed) we'd like to focus on the lessons we've… 
2009
2009
This paper presents architecture independent characterization of embedded Java workloads based on the industry standard… 
2001
2001
Ada 95 has been the first standardized language to include distribution in the core language itself. However, the set of features… 
2000
2000
Hardware software co-verification tools allow a designer to run software against a hardware design before a prototype has been…