Sciweavers

1022 search results - page 184 / 205
» Challenges for Constraint Programming in Networking
Sort
View
IPPS
2007
IEEE
15 years 6 months ago
Improving MPI Independent Write Performance Using A Two-Stage Write-Behind Buffering Method
Many large-scale production applications often have very long executions times and require periodic data checkpoints in order to save the state of the computation for program rest...
Wei-keng Liao, Avery Ching, Kenin Coloma, Alok N. ...
MIDDLEWARE
2007
Springer
15 years 6 months ago
Vector-Field Consistency for Ad-Hoc Gaming
Abstract. Developing distributed multiplayer games for ad-hoc networks is challenging. Consistency of the replicated shared state is hard to ensure at a low cost. Current consisten...
Nuno Santos, Luís Veiga, Paulo Ferreira
ARC
2010
Springer
186views Hardware» more  ARC 2010»
15 years 3 months ago
Application-Specific Signatures for Transactional Memory in Soft Processors
As reconfigurable computing hardware and in particular FPGA-based systems-on-chip comprise an increasing number of processor and accelerator cores, supporting sharing and synchroni...
Martin Labrecque, Mark Jeffrey, J. Gregory Steffan
88
Voted
DATE
2010
IEEE
142views Hardware» more  DATE 2010»
15 years 20 days ago
Transition-aware real-time task scheduling for reconfigurable embedded systems
—Due to increase in demand for reconfigurability in embedded systems, real-time task scheduling is challenged by non-negligible reconfiguration overheads. If such overheads are n...
Hessam Kooti, Elaheh Bozorgzadeh, Shenghui Liao, L...
CCR
2004
151views more  CCR 2004»
15 years 9 days ago
Practical verification techniques for wide-area routing
Protocol and system designers use verification techniques to analyze a system's correctness properties. Network operators need verification techniques to ensure the "cor...
Nick Feamster