Sciweavers

6770 search results - page 336 / 1354
» How GPUs Work
Sort
View
PPL
2007
86views more  PPL 2007»
15 years 3 months ago
Failure-Sensitive Analysis of Parallel Algorithms with Controlled Memory Access Concurrency
ract problem of using P failure-prone processors to cooperatively update all locations of an N-element shared array is called Write-All. Solutions to Write-All can be used iterati...
Chryssis Georgiou, Alexander Russell, Alexander A....
PODS
2009
ACM
130views Database» more  PODS 2009»
16 years 5 months ago
Secondary indexing in one dimension: beyond b-trees and bitmap indexes
Let be a finite, ordered alphabet, and consider a string x = x1x2 . . . xn n . A secondary index for x answers alphabet range queries of the form: Given a range [al, ar] , retu...
Rasmus Pagh, Srinivasa Rao Satti
MOBISYS
2009
ACM
16 years 5 months ago
EnTracked: energy-efficient robust position tracking for mobile devices
An important feature of a modern mobile device is that it can position itself. Not only for use on the device but also for remote applications that require tracking of the device....
Mikkel Baun Kjærgaard, Jakob Langdal, Torben...
CHI
2003
ACM
16 years 4 months ago
Ethnographic interviews guide design of ford vehicles website
This case study describes ethnographic interviews with vehicle buyers to learn how they make purchase decisions. The research was conducted for J. Walter Thompson (JWT), the digit...
Lori Anschuetz, Stephanie Rosenbaum
DSN
2009
IEEE
15 years 11 months ago
On the effectiveness of structural detection and defense against P2P-based botnets
Recently, peer-to-peer (P2P) networks have emerged as a covert communication platform for malicious programs known as bots. As popular distributed systems, they allow bots to comm...
Duc T. Ha, Guanhua Yan, Stephan Eidenbenz, Hung Q....