Sciweavers

790 search results - page 107 / 158
» Limits of Work-Stealing Scheduling
Sort
View
111
Voted
HICSS
1998
IEEE
140views Biometrics» more  HICSS 1998»
15 years 4 months ago
A Multi-Agent Approach to the Deregulation and Restructuring of Power Industry
In recent years, electric utility industry in the whole world has been facing pressure to be deregulated or restructured in order to increase its efficiency, to reduce operational...
Felix F. Wu, Chris Yeung, Ada Poon, Jerome Yen
IPPS
1996
IEEE
15 years 4 months ago
Efficient Run-Time Support for Irregular Task Computations with Mixed Granularities
Many irregular scientific computing problems can be modeled by directed acyclic task graphs (DAGs). In this paper, we present an efficient run-time system for executing general as...
Cong Fu, Tao Yang
ICCD
1993
IEEE
111views Hardware» more  ICCD 1993»
15 years 4 months ago
Ravel-XL: A Hardware Accelerator for Assigned-Delay Compiled-Code Logic Gate Simulation
Ravel-XL is a single-boardhardware accelerator for gate-level digital logic simulation. It uses a standard levelizedcode approach to statically schedule gate evaluations.However, u...
Michael A. Riepe, João P. Marques Silva, Ka...
MICRO
1993
IEEE
128views Hardware» more  MICRO 1993»
15 years 4 months ago
Techniques for extracting instruction level parallelism on MIMD architectures
Extensive research has been done on extracting parallelism from single instruction stream processors. This paper presents some results of our investigation into ways to modify MIM...
Gary S. Tyson, Matthew K. Farrens
AGILEDC
2008
IEEE
15 years 2 months ago
How Did We Adapt Agile Processes to Our Distributed Development?
Today, many software projects are being developed by collaborating programmers working across multiple locations. Whatever the reason may be, outsourcing, organizational structure...
Cynick Young, Hiroki Terashima