Sciweavers

790 search results - page 103 / 158
» Limits of Work-Stealing Scheduling
Sort
View
94
Voted
IPPS
2010
IEEE
14 years 10 months ago
Solving the advection PDE on the cell broadband engine
In this paper we present the venture of porting two different algorithms for solving the two-dimensional advection PDE on the CBE platform, an in-place and an outof-place one, and ...
Georgios Rokos, Gerassimos Peteinatos, Georgia Kou...
TON
2010
192views more  TON 2010»
14 years 7 months ago
Delay analysis for wireless networks with single hop traffic and general interference constraints
We consider a class of wireless networks with general interference constraints on the set of links that can be served simultaneously at any given time. We restrict the traffic to b...
Gagan Raj Gupta, Ness B. Shroff
ISCA
1995
IEEE
120views Hardware» more  ISCA 1995»
15 years 4 months ago
Unconstrained Speculative Execution with Predicated State Buffering
Speculative execution is execution of instructions before it is known whether these instructions should be executed. Compiler-based speculative execution has the potential to achi...
Hideki Ando, Chikako Nakanishi, Tetsuya Hara, Masa...
HICSS
1995
IEEE
128views Biometrics» more  HICSS 1995»
15 years 4 months ago
Instruction Level Parallelism
Abstract. We reexamine the limits of parallelism available in programs, using runtime reconstruction of program data-flow graphs. While limits of parallelism have been examined in...
77
Voted
HICSS
2010
IEEE
205views Biometrics» more  HICSS 2010»
15 years 7 months ago
Loadable Hypervisor Modules
The topic of virtualization has received renewed attention. Xen is a popular open source type-I hypervisor. The Xen hypervisor currently has limited capabilities for runtime modiï...
Thomas Naughton, Geoffroy Vallée, Stephen L...