Sciweavers

SC
2015
ACM
9 years 11 months ago
Adaptive and transparent cache bypassing for GPUs
In the last decade, GPUs have emerged to be widely adopted for general-purpose applications. To capture on-chip locality for these applications, modern GPUs have integrated multil...
SC
2015
ACM
9 years 11 months ago
Techniques for modeling large-scale HPC I/O workloads
Accurate analysis of HPC storage system designs is contingent on the use of I/O workloads that are truly representative of expected use. However, I/O analyses are generally bound ...
Shane Snyder, Philip H. Carns, Robert Latham, Misb...
SC
2015
ACM
9 years 11 months ago
Clock delta compression for scalable order-replay of non-deterministic parallel applications
The ability to record and replay program execution helps significantly in debugging non-deterministic MPI applications by reproducing message-receive orders. However, the large a...
CCECE
2015
IEEE
9 years 11 months ago
Simulation of communications using underwater acoustic signals impaired by wide band attenuation
Abstract— We study simulation of underwater communications using acoustic signals impaired by attenuation and multipath propagation. Attenuation is sensitive to the sourcereceive...
Jie Huang, Michel Barbeau, Stephane Blouin, Craig ...
CCECE
2015
IEEE
9 years 11 months ago
An estimation based allocation rule with super-linear regret and finite lock-on time for time-dependent multi-armed bandit proce
— The multi-armed bandit (MAB) problem has been an active area of research since the early 1930s. The majority of the literature restricts attention to i.i.d. or Markov reward pr...
Prokopis C. Prokopiou, Peter E. Caines, Aditya Mah...