Sciweavers

23119 search results - page 4551 / 4624
» From Domain to Requirements
Sort
View
SIGOPS
2008
146views more  SIGOPS 2008»
14 years 11 months ago
Vigilant: out-of-band detection of failures in virtual machines
What do our computer systems do all day? How do we make sure they continue doing it when failures occur? Traditional approaches to answering these questions often involve inband m...
Dan Pelleg, Muli Ben-Yehuda, Richard Harper, Lisa ...
IJHPCA
2007
114views more  IJHPCA 2007»
14 years 11 months ago
An Approach To Data Distributions in Chapel
A key characteristic of today’s high performance computing systems is a physically distributed memory, which makes the efficient management of locality essential for taking adv...
R. E. Diaconescu, Hans P. Zima
SIGPLAN
2008
14 years 11 months ago
Single global lock semantics in a weakly atomic STM
As memory transactions have been proposed as a language-level replacement for locks, there is growing need for well-defined semantics. In contrast to database transactions, transa...
Vijay Menon, Steven Balensiefer, Tatiana Shpeisman...
SP
2008
IEEE
122views Security Privacy» more  SP 2008»
14 years 11 months ago
Large-scale phylogenetic analysis on current HPC architectures
Abstract. Phylogenetic inference is considered a grand challenge in Bioinformatics due to its immense computational requirements. The increasing popularity and availability of larg...
Michael Ott, Jaroslaw Zola, Srinivas Aluru, Andrew...
IJON
2007
80views more  IJON 2007»
14 years 11 months ago
To each his own: The caregiver's role in a computational model of gaze following
We investigate a computational model of the emergence of gaze following that is based on a generic basic set of mechanisms. Whereas much attention has been focused so far on the s...
Christof Teuscher, Jochen Triesch
« Prev « First page 4551 / 4624 Last » Next »