Sciweavers

62 search results - page 4 / 13
» Modelling the ARMv8 architecture, operationally: concurrency...
Sort
View
WSNA
2003
ACM
13 years 11 months ago
Analyzing and modeling encryption overhead for sensor network nodes
Recent research in sensor networks has raised security issues for small embedded devices. Security concerns are motivated by the deployment of a large number of sensory devices in...
Prasanth Ganesan, Ramnath Venugopalan, Pushkin Ped...
CONCURRENCY
2004
151views more  CONCURRENCY 2004»
13 years 6 months ago
User transparency: a fully sequential programming model for efficient data parallel image processing
Although many image processing applications are ideally suited for parallel implementation, most researchers in imaging do not benefit from high performance computing on a daily b...
Frank J. Seinstra, Dennis Koelma
ASIAN
2004
Springer
150views Algorithms» more  ASIAN 2004»
13 years 11 months ago
Concurrent Constraint-Based Memory Machines: A Framework for Java Memory Models
A central problem in extending the von Neumann architecture to petaflop computers with millions of hardware threads and with a shared memory is defining the memory model [Lam79,...
Vijay A. Saraswat
CAV
2012
Springer
265views Hardware» more  CAV 2012»
11 years 8 months ago
An Axiomatic Memory Model for POWER Multiprocessors
The growing complexity of hardware optimizations employed by multiprocessors leads to subtle distinctions among allowed and disallowed behaviors, posing challenges in specifying th...
Sela Mador-Haim, Luc Maranget, Susmit Sarkar, Kayv...
WEBDB
2010
Springer
224views Database» more  WEBDB 2010»
13 years 11 months ago
Concurrent One-Way Protocols in Around-the-Clock Social Networks
We introduce and study concurrent One-Way Protocols in social networks. The model is motivated by the rise of online social networks and the fast development of automation feature...
Royi Ronen, Oded Shmueli