Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Kevin E. Moore"'
Publikováno v:
Personality and Individual Differences. 152:109577
The Dark Triad (D3) traits of narcissism, Machiavellianism, and psychopathy have been linked to a range of moral behavior, and to sociosexuality and sexual behavior, particularly in males. The current study examined whether males and females differ w
Autor:
Mark D. Hill, Luke Yen, Michael M. Swift, Kevin E. Moore, Jayaram Bobba, Darien Wood, Haris Volos
Publikováno v:
ISCA
Hardware Transactional Memory (HTM) systems reflect choices from three key design dimensions: conflict detection, version management, and conflict resolution. Previously proposed HTMs represent three points in this design space: lazy conflict detecti
Autor:
Jayaram Bobba, Mark D. Hill, Kevin E. Moore, Luke Yen, Ben Liblit, Michael M. Swift, Michelle J. Moravan, Darien Wood
Publikováno v:
ASPLOS
Nested transactional memory (TM) facilitates software composition by letting one module invoke another without either knowing whether the other uses transactions. Closed nested transactions extend isolation of an inner transaction until the toplevel
Autor:
Mark D. Hill, Alaa R. Alameldeen, Bradford M. Beckmann, Michael R. Marty, Milo M. K. Martin, Daniel J. Sorin, Kevin E. Moore, Min Xu, Darien Wood
Publikováno v:
ACM SIGARCH Computer Architecture News. 33:92-99
The Wisconsin Multifacet Project has created a simulation toolset to characterize and evaluate the performance of multiprocessor hardware systems commonly used as database and web servers. We leverage an existing full-system functional simulation inf
Autor:
Mark D. Hill, Kevin E. Moore, Alaa R. Alameldeen, Milo M. K. Martin, Min Xu, Darien Wood, Daniel J. Sorin, Carl J. Mauer
Publikováno v:
Computer. 36:50-57
As dependence on database management systems and Web servers increases, so does the need for them to run reliably and efficiently-goals that rigorous simulations can help achieve. Execution-driven simulation models system hardware. These simulations
Autor:
Kevin E. Moore, Yueping Zhang
Publikováno v:
College Teaching. 53:155-157
This article describes an active learning demonstration to increase student interest in and involvement with the topic of research ethics and deception. Students received false, low feedback on an exam and then completed a faculty evaluation form. Th
Autor:
Michael M. Swift, Darien Wood, Luke Yen, Kevin E. Moore, Mark D. Hill, Michael R. Marty, Haris Volos, Jayaram Bobba
Publikováno v:
HPCA
This paper proposes a hardware transactional memory (HTM) system called LogTM Signature Edition (LogTM-SE). LogTM-SE uses signatures to summarize a transactions read-and write-sets and detects conflicts on coherence requests (eager conflict detection
Publikováno v:
HPCA
Transactional memory (TM) simplifies parallel programming by guaranteeing that transactions appear to execute atomically and in isolation. Implementing these properties includes providing data version management for the simultaneous storage of both n
Publikováno v:
ICPP
Java-based middleware is a rapidly growing workload for high-end server processors, particularly chip multiprocessors (CMP). To help architects design future microprocessors to run this important new workload, we provide a detailed characterization o
Publikováno v:
HPCA
In this paper, we present a detailed characterization of the memory system, behavior of ECperf and SPECjbb using both commercial server hardware and Simics full-system simulation. We find that the memory footprint and primary working sets of these wo