Sciweavers

5790 search results - page 772 / 1158
» Distributed programming with distributed authorization
Sort
View
141
Voted
ICPPW
2006
IEEE
15 years 9 months ago
A Toolkit-Based Approach to Indoor Localization
Location is one of the most important contexts used in the applications in the pervasive computing environments . It helps the application do the right thing at the right place. O...
Yu Wang, Adam Harder
IPPS
2006
IEEE
15 years 9 months ago
An experimental study of optimizing bioinformatics applications
As bioinformatics is an emerging application of high performance computing, this paper first evaluates the memory performance of several representative bioinformatics application...
Guangming Tan, Lin Xu, Shengzhong Feng, Ninghui Su...
96
Voted
IPPS
2006
IEEE
15 years 9 months ago
Empowering a helper cluster through data-width aware instruction selection policies
Narrow values that can be represented by less number of bits than the full machine width occur very frequently in programs. On the other hand, clustering mechanisms enable cost- a...
Osman S. Unsal, Oguz Ergin, Xavier Vera, Antonio G...
158
Voted
IPPS
2006
IEEE
15 years 9 months ago
Multiple sequence alignment by quantum genetic algorithm
In this paper we describe a new approach for the well known problem in bioinformatics: Multiple Sequence Alignment (MSA). MSA is fundamental task as it represents an essential pla...
L. Abdesslem, M. Soham, B. Mohamed
115
Voted
IPPS
2006
IEEE
15 years 9 months ago
Improving cache locality for thread-level speculation
With the advent of chip-multiprocessors (CMPs), Thread-Level Speculation (TLS) remains a promising technique for exploiting this highly multithreaded hardware to improve the perfo...
Stanley L. C. Fung, J. Gregory Steffan