Sciweavers

1906 search results - page 109 / 382
» Dependable Self-Hosting Distributed Systems Using Constraint...
Sort
View
104
Voted
CASCON
2006
98views Education» more  CASCON 2006»
15 years 4 months ago
A lightweight approach to state based security testing
State based protocols are protocols in which the handling of one message depends on the contents of previous messages. Testing such protocols, for security or for other purposes u...
Songtao Zhang, Thomas R. Dean, Scott Knight
HPCA
1999
IEEE
15 years 7 months ago
A Study of Control Independence in Superscalar Processors
Control independence has been put forward as a significant new source of instruction-level parallelism for future generation processors. However, its performance potential under p...
Eric Rotenberg, Quinn Jacobson, James E. Smith
P2P
2005
IEEE
112views Communications» more  P2P 2005»
15 years 9 months ago
Randomized Protocols for Duplicate Elimination in Peer-to-Peer Storage Systems
Distributed peer-to-peer systems rely on voluntary participation of peers to effectively manage a storage pool. In such systems, data is generally replicated for performance and a...
Ronaldo A. Ferreira, Murali Krishna Ramanathan, An...
EMNLP
2009
15 years 1 months ago
Effective Use of Linguistic and Contextual Information for Statistical Machine Translation
Current methods of using lexical features in machine translation have difficulty in scaling up to realistic MT tasks due to a prohibitively large number of parameters involved. In...
Libin Shen, Jinxi Xu, Bing Zhang, Spyros Matsoukas...
PVM
2009
Springer
15 years 10 months ago
Optimizing MPI Runtime Parameter Settings by Using Machine Learning
Abstract. Manually tuning MPI runtime parameters is a practice commonly employed to optimise MPI application performance on a specific architecture. However, the best setting for ...
Simone Pellegrini, Jie Wang, Thomas Fahringer, Han...