Sciweavers

5790 search results - page 263 / 1158
» Distributed programming with distributed authorization
Sort
View
IPPS
2005
IEEE
15 years 8 months ago
MPISH: A Parallel Shell for MPI Programs
While previous work has shown MPI to provide capabilities for system software, actual adoption has not widely occurred. We discuss process management shortcomings in MPI implement...
Narayan Desai, Andrew Lusk, Rick Bradshaw, Ewing L...
IPPS
1999
IEEE
15 years 7 months ago
Examples of Program Composition Illustrating the Use of Universal Properties
Abstract. This paper uses a theory of composition based on existential and universal properties. Universal properties are useful to describe components interactions through shared ...
Michel Charpentier, K. Mani Chandy
106
Voted
EUROPAR
1997
Springer
15 years 7 months ago
A Relational Approach to the Compilation of Sparse Matrix Programs
Abstract. We present a relational algebra based framework for compiling e cient sparse matrix code from dense DO-ANY loops and a speci cation of the representation of the sparse ma...
Vladimir Kotlyar, Keshav Pingali, Paul Stodghill
PDCAT
2004
Springer
15 years 8 months ago
Tamper Resistant Software by Integrity-Based Encryption
There are many situations in which it is desirable to protect a piece of software from illegitimate tampering once it gets distributed to the users. Protecting the software code me...
Jaewon Lee, Heeyoul Kim, Hyunsoo Yoon
114
Voted
ICDCS
1991
IEEE
15 years 6 months ago
Supporting the development of network programs
of ‘‘network computers’’ is inherently lessAbstract predictable than that of more traditional distributed memory systems, such as hypercubes [22], since both theFor computa...
Bernd Bruegge, Peter Steenkiste