Sciweavers

5790 search results - page 602 / 1158
» Distributed programming with distributed authorization
Sort
View
EUROPAR
1997
Springer
15 years 8 months ago
The Performance Potential of Value and Dependence Prediction
Abstract. The serialization constraints induced by the detection and enforcement of true data dependences have always been regarded as requirements for correct execution. We propos...
Mikko H. Lipasti, John Paul Shen
USM
2000
15 years 8 months ago
Trade-offs in a Secure Jini Service Architecture
Jini is an infrastructure built on top of the mobile code facilities of the Java programming language enabling clients and services to spontaneously engage in arbitrary usage scena...
Peer Hasselmeyer, Roger Kehr, Marco Voß
142
Voted
HPDC
1995
IEEE
15 years 8 months ago
Disk-Directed I/O for an Out-of-Core Computation
New file systems are critical to obtain good I/O performance on large multiprocessors. Several researchers have suggested the use of collective file-system operations, in which ...
David Kotz
118
Voted
ICS
1995
Tsinghua U.
15 years 8 months ago
Gated SSA-based Demand-Driven Symbolic Analysis for Parallelizing Compilers
In this paper, we present a GSA-based technique that performs more e cient and more precise symbolic analysis of predicated assignments, recurrences and index arrays. The e ciency...
Peng Tu, David A. Padua
IPPS
1995
IEEE
15 years 8 months ago
Symbolic range propagation
Abstract. To e ectively parallelize real programs, parallelizing compilers need powerful symbolic analysis techniques 13, 6 . In previous work we have introduced an algorithm calle...
William Blume, Rudolf Eigenmann