Skip to search formSkip to main contentSkip to account menu

Hot spot (computer programming)

Known as: Hot spot (computer science), Hotspot (computer science) 
A hot spot in computer science is most usually defined as a region of a computer program where a high proportion of executed instructions occur or… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Hardware Trojan research has become an important research topic in recent time since the increased awareness of hardware security… 
2013
2013
Virtual machines are versatile systems that can support innovative solutions to many problems. These systems usually rely on… 
2012
2012
As technology scales, the protection of Finite State Machines' (FSMs) states against single event upset (SEU) and multiple bit… 
2012
2012
The runtime environment of Android is based on its own Java Virtual Machine(JVM) called Dalvik Virtual Machine (DVM) which is… 
2010
2010
338 Abstract — Intrusion detection techniques are indispensable for the security infrastructure in order to detect threats before… 
2010
2010
Dynamic Binary Translation(DBT) is widely used, but it suffers from substantial overhead. Several methods are taken to improve… 
2009
2009
We use Erlang, ML, and Haskell for a few small projects but (as I'm sure you guessed) we'd like to focus on the lessons we've… 
2007
2007
There is an ever-increasing gap between memory and processor performance. As a result, exploiting the cache becomes increasingly… 
2001
2001
Ada 95 has been the first standardized language to include distribution in the core language itself. However, the set of features…