Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Throttling process (computing)

Known as: Throttling process (software) 
In software, a throttling process, or a throttling controller as it is sometimes called, is a process responsible for regulating the rate at which… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
A multi-tenancy system hosts many clients using shared capacity and resources. Client requests (demand) may have different… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2015
Highly Cited
2015
To support massive number of parallel thread contexts, Graphics Processing Units (GPUs) use a huge register file, which is… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 5
  • figure 6
Highly Cited
2014
Highly Cited
2014
Live virtual machine migration allows the movement of a running VM from one physical host to another with negligible disruption… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2012
Highly Cited
2012
Shared resource access interference, particularly memory and system bus, is a big challenge in designing predictable real-time… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Highly Cited
2012
Highly Cited
2012
YouTube traffic is bursty. These bursts trigger packet losses and stress router queues, causing TCP's congestion-control… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • table 2
Highly Cited
2012
Highly Cited
2012
The network-on-chip (NoC) is a primary shared resource in a chip multiprocessor (CMP) system. As core counts continue to increase… Expand
  • table I
  • figure 1
  • table II
  • table III
  • figure 2
2010
2010
 
Highly Cited
2009
Highly Cited
2009
Linked data structure (LDS) accesses are critical to the performance of many large scale applications. Techniques have been… Expand
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5
Highly Cited
2009
Highly Cited
2009
Inductive noise forces microprocessor designers to sacrifice performance in order to ensure correct and reliable operation of… Expand
Highly Cited
2007
Highly Cited
2007
The fear of unauthorized, hidden readouts has dominated the radio frequency identification (RFID) privacy debate. Virtually all… Expand
  • figure 1
  • table I
  • figure 2
  • figure 3
  • table II