Sciweavers

5790 search results - page 780 / 1158
» Distributed programming with distributed authorization
Sort
View
ISPAN
2002
IEEE
15 years 8 months ago
Automatic Processor Lower Bound Formulas for Array Computations
In the directed acyclic graph (dag) model of algorithms, consider the following problem for precedence-constrained multiprocessor schedules for array computations: Given a sequenc...
Peter R. Cappello, Ömer Egecioglu
SPAA
2010
ACM
15 years 8 months ago
Lightweight, robust adaptivity for software transactional memory
When a program uses Software Transactional Memory (STM) to synchronize accesses to shared memory, the performance often depends on which STM implementation is used. Implementation...
Michael F. Spear
CONCUR
2001
Springer
15 years 8 months ago
CCS with Priority Guards
It has long been recognised that standard process algebra has difficulty dealing with actions of different priority, such as for instance an interrupt action of high priority. Va...
Iain Phillips
EUROPAR
2001
Springer
15 years 7 months ago
An Efficient Indirect Branch Predictor
In this paper, we present a new hybrid branch predictor called the GoStay2, which can effectively reduce indirect misprediction rates. The GoStay2 has two different mechanisms comp...
Yul Chu, Mabo Robert Ito
ICS
2001
Tsinghua U.
15 years 7 months ago
Tools for application-oriented performance tuning
Application performance tuning is a complex process that requires assembling various types of information and correlating it with source code to pinpoint the causes of performance...
John M. Mellor-Crummey, Robert J. Fowler, David B....