21 papers:
- POPL-2015-VafeiadisBCMN #compilation #memory management #optimisation #what
- Common Compiler Optimisations are Invalid in the C11 Memory Model and what we can do about it (VV, TB, SC, RM, FZN), pp. 209–220.
- ASPLOS-2015-SungA #named #performance
- DeNovoSync: Efficient Support for Arbitrary Synchronization without Writer-Initiated Invalidations (HS, SVA), pp. 545–559.
- CAiSE-2012-KopkeE #logic #semantics
- Logical Invalidations of Semantic Annotations (JK, JE), pp. 144–159.
- SIGIR-2012-BaiJ #online #realtime #web
- Online result cache invalidation for real-time web search (XB, FPJ), pp. 641–650.
- HPCA-2012-NegiGAGS #hardware #lazy evaluation #memory management #named #scalability #transaction
- π-TM: Pessimistic invalidation for scalable lazy hardware transactional memory (AN, JRTG, MEA, JMG, PS), pp. 141–152.
- DATE-2011-GaoHL #debugging #multi
- Eliminating data invalidation in debugging multiple-clock chips (JG, YH, XL), pp. 691–696.
- SIGIR-2011-AliciAOCU #web
- Timestamp-based result cache invalidation for web search engines (SA, ISA, RO, BBC, ÖU), pp. 973–982.
- ICST-2011-Sun #debugging #question #why
- Why are Bug Reports Invalid? (JS), pp. 407–410.
- CGO-2010-GottschlichVS #memory management #performance #transaction #using
- An efficient software transactional memory using commit-time invalidation (JEG, MV, JGS), pp. 101–110.
- SAC-2006-MadhukarA #adaptation #database #energy #mobile #performance
- An adaptive energy efficient cache invalidation scheme for mobile databases (AM, RA), pp. 1122–1126.
- CIKM-2004-TakakiFI #analysis #documentation #query #retrieval #topic
- Associative document retrieval by query subtopic analysis and its application to invalidity patent search (TT, AF, TI), pp. 399–405.
- SAC-2004-ParkerC #policy #protocol
- Extending invalid-access prevention policy protocols for mobile-client data caching (SP, ZC), pp. 1171–1176.
- DRR-2003-MaderlechnerS #recognition #set #using
- Extraction of valid data sets in registers using recognition of invalidation lines (GM, PS), pp. 67–72.
- SAC-2003-LaiTB #mobile #performance
- Cost Efficient Broadcast Based Cache Invalidation for Mobile Environments (KYL, ZT, PB), pp. 871–877.
- ESEC-FSE-2003-YongH #c #pointer #source code
- Protecting C programs from attacks via invalid pointer dereferences (SHY, SH), pp. 307–316.
- VLDB-2002-CandanALPH #architecture #multi
- View Invalidation for Dynamic Content Caching in Multitiered Architectures (KSC, DA, WSL, OP, WPH), pp. 562–573.
- CAV-2002-BozzanoD #algorithm #protocol #verification
- Algorithmic Verification of Invalidation-Based Protocols (MB, GD), pp. 295–308.
- CIKM-2001-HouSZW #database #mobile
- An Optimal Construction of Invalidation Reports for Mobile Databases (WCH, MS, HZ, HW), pp. 458–465.
- CAV-1998-Moore #proving
- An ACL2 Proof of Write Invalidate Cache Coherence (JSM), pp. 29–38.
- HPDC-1997-HuL #adaptation #mobile
- Adaptive Cache Invalidation Methods in Mobile Environments (QH, DLL), pp. 264–273.
- ASPLOS-1989-WeberG #analysis #multi
- Analysis of Cache Invalidation Patterns in Multiprocessors (WDW, AG), pp. 243–256.