搜索结果: 1-15 共查到“知识库 计算机存储技术”相关记录227条 . 查询时间(5.831 秒)
HISTORIC BIM: A NEW REPOSITORY FOR STRUCTURAL HEALTH MONITORING
Archive BIM Bridge HBIM Monitoring Repository
2017/6/20
Recent developments in Building Information Modelling (BIM) technologies are facilitating the management of historic complex structures using new applications. This paper proposes a generative method ...
随着遥感、定位等技术的不断发展,时空数据大量的产生需要科学化的管理,从而发挥其价值。研究现状中,大量的工作关注于如何利用HBase有效存储和快速查询结构化的时空数据,然而实际中,有些时空数据存在于半结构文档中,如描述遥感产品的元数据,对于这类数据,往往进行如XPath的半结构化+时空查询,这个问题在前序工作中较少讨论。本文针对在HBase中如何进行有效的半结构化时空数据存储和查询问题展开研究,首先...
Much research has been devoted to studies of and algorithms for memory management based on garbage collection or explicit allocation and deallocation. An alternative approach, region-based memory mana...
Context- and Path-Sensitive Memory Leak Detection
Program analysis error detection memory management memory leaks boolean satisfiability
2016/5/24
We present a context- and path-sensitive algorithm for detecting memory leaks in programs with explicit memory management. Our leak detection algorithm is based on an underlying escape analysis: any a...
Compilation for Explicitly Managed Memory Hierarchies
Software-managed memory hierarchy bulk operations
2016/5/24
We present a compiler for machines with an explicitly managed memory hierarchy and suggest that a primary role of any compiler for such architectures is to manipulate and schedule a hierarchy of bulk ...
A Portable Runtime Interface For Multi-Level Memory Hierarchies
Memory Hierarchies Parallelism Runtime Sequoia
2016/5/24
We present a platform independent runtime interface for moving data and computation through parallel machines with multi-level memory hierarchies. We show that this interface can be used as a compiler...
Symbolic Heap Abstraction with Demand-Driven Axiomatization of Memory Invariants
Heap Analysis Relational Static Analysis Array Analysis Memory Invariants
2016/5/24
Many relational static analysis techniques for precise reasoning about heap contents perform an explicit case analysis of all possible heaps that can arise. We argue that such precise relational reaso...
M3: High-Performance Memory Management from Off-the-Shelf Components
Memory Management Garbage Collection Tracing Mark-Sweep Reference Counting
2016/5/24
Real-world garbage collectors in managed languages are complex.We investigate whether this complexity is really necessary and show that by having a different (but wider) interface between the collecto...
Automatic and Transparent I/O Optimization With Storage Integrated Application Runtime Support
Automatic Transparent I/O Optimization Storage Integrated Application Runtime Support
2016/5/24
Traditionally storage has not been part of a programming model’s semantics and is added only as an I/O library interface.
On the Need of Physical Security for Small Embedded Devices: a Case Study with COMP128-1 Implementations in SIM Cards
Physical Security Small Embedded Devices COMP128-1 Implementations SIM Cards
2016/1/23
Ensuring the physical security of small embedded devices is challenging. Such devices have to be produced under strong cost con-straints, and generally operate with limited power and energy budget.How...
Memory-built-in quantum cloning in a hybrid solid-state spin register
Memory-built-in quantum cloning hybrid solid-state spin register
2016/1/22
As a way to circumvent the quantum no-cloning theorem, approximate quantum cloning protocols have received wide attention with remarkable applications. Copying of quantum states to memory qubits provi...