Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,651,331 papers from all fields of science
Search
Sign In
Create Free Account
Shadow memory
Known as:
Shadow (disambiguation)
Shadow memory is a technique used to track and store information on computer memory used by a program during its execution. Shadow memory consists of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
11 relations
AddressSanitizer
Binary translation
Clang
Computer memory
Expand
Broader (1)
Memory management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
A Fast, Cycle-accurate Space Processor Emulator Based on a Dynamic Binary Translator
Jong-Wook Choi
,
Byeong-Gyu Nam
2015
Corpus ID: 89615676
For many years, flight software (FSW) has been developed and verified using real hardware-based software test beds (STBs). Even…
Expand
2015
2015
Hardware support for Local Memory Transactions on GPU Architectures
Alejandro Villegas
,
A. Navarro
,
Rafael Asenjo-Plaza
,
O. Plata
,
R. Ubal
,
D. Kaeli
2015
Corpus ID: 15665974
Graphics Processing Units (GPUs) are popular hardware accelerators for data-parallel applications, enabling the execution of…
Expand
2014
2014
A 6T-4C shadow memory using plate line and word line boosting
Tomoki Nakagawa
,
S. Izumi
,
+4 authors
M. Yoshimoto
International Symposium on Circuits and Systems
2014
Corpus ID: 1386649
This report describes a high speed 6T-4C shadow memory design using a word line boosting and a plate line driver boosting. The…
Expand
2013
2013
Discovery of Potential Parallelism in Sequential Programs
Zhen Li
,
A. Jannesari
,
F. Wolf
International Conference on Parallel Processing
2013
Corpus ID: 18087845
Although multicore CPUs are dominating the market of desktops and servers, writing programs that utilize the available hardware…
Expand
2013
2013
Explicit Untainting to Reduce Shadow Memory Usage and Access Frequency in Taint Analysis
Jae-Won Min
,
Young-Hyun Choi
,
Jung-Ho Eom
,
Tai-Myung Chung
Communication Systems and Applications
2013
Corpus ID: 37461362
Software vulnerabilities weaken the security of a system increasing possibility of being attacked by exploits in the wild. There…
Expand
2010
2010
Exploring Multiple Execution Paths Based on Dynamic Lazy Analysis: Exploring Multiple Execution Paths Based on Dynamic Lazy Analysis
Kai Chen
,
Deng-Guo Feng
,
Pu-Rui Su
2010
Corpus ID: 63406196
2007
2007
Impulse : An Adaptable Memory System
J. Carter
,
Wilson C. Hsieh
,
+9 authors
T. Tateyama
2007
Corpus ID: 16910070
This paper presents the Impulse adaptable memory system, which allows applications to make efficient use of cache space and bus…
Expand
2000
2000
Boosting superpage utilization with the shadow memory and the partial-subblock TLB
Cheol Ho Park
,
Jaewoong Chung
,
Byeong Hag Seong
,
Yangwoo Roh
,
D. Park
International Conference on Supercomputing
2000
Corpus ID: 6960911
While superpage is an efficient solution to increase TLB reach, its limited flexibility for address mapping is still a hard issue…
Expand
2000
2000
Two-step backup mechanism for real-time main memory database recovery
Miseon Choi
,
Hye-Sook Yoon
,
+5 authors
W. Choi
Proceedings Seventh International Conference on…
2000
Corpus ID: 12948243
Proposes a recovery mechanism for real-time main-memory database systems (RT-MMDBSs) which aims at reducing the system recovery…
Expand
1998
1998
Increasing TLB reach using superpages backed by shadow memory
SwansonMark
,
StollerLeigh
,
CarterJohn
1998
Corpus ID: 215878433
The amount of memory that can be accessed without causing a TLB fault, the reach of a TLB, is failing to keep pace with the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE