Sciweavers

4889 search results - page 326 / 978
» A Refactoring Approach to Parallelism
Sort
View
SPAA
1998
ACM
15 years 8 months ago
Analyses of Load Stealing Models Based on Differential Equations
In this paper we develop models for and analyze several randomized work stealing algorithms in a dynamic setting. Our models represent the limiting behavior of systems as the numb...
Michael Mitzenmacher
HPCA
1995
IEEE
15 years 8 months ago
Access Ordering and Memory-Conscious Cache Utilization
As processor speeds increase relative to memory speeds, memory bandwidth is rapidly becoming the limiting performance factor for many applications. Several approaches to bridging ...
Sally A. McKee, William A. Wulf
EUROPAR
2008
Springer
15 years 6 months ago
Fault-Tolerant Partial Replication in Large-Scale Database Systems
We investigate a decentralised approach to committing transactions in a replicated database, under partial replication. Previous protocols either reexecute transactions entirely an...
Pierre Sutra, Marc Shapiro
131
Voted
EUROPAR
2008
Springer
15 years 6 months ago
Flying Low: Simple Leases with Workspace Pilot
As the use of virtual machines (VMs) for scientific applications becomes more common, we encounter the need to integrate VM provisioning models into the existing resource managemen...
Timothy Freeman, Katarzyna Keahey
HPDC
2010
IEEE
15 years 5 months ago
DiscFinder: a data-intensive scalable cluster finder for astrophysics
DiscFinder is a scalable approach for identifying large-scale astronomical structures, such as galaxy clusters, in massive observation and simulation astrophysics datasets. It is ...
Bin Fu, Kai Ren, Julio López, Eugene Fink, ...