Sciweavers

1092 search results - page 111 / 219
» Located Operators
Sort
View
101
Voted
IPPS
1998
IEEE
15 years 6 months ago
Compiler-Optimization of Implicit Reductions for Distributed Memory Multiprocessors
This paper presents reduction recognition and parallel code generationstrategies for distributed-memorymultiprocessors. We describe techniques to recognize a broad range of implic...
Bo Lu, John M. Mellor-Crummey
121
Voted
DBPL
1993
Springer
125views Database» more  DBPL 1993»
15 years 5 months ago
Octopus: A Reflective Language Mechanism for Object Manipulation
A class of database programs exist which are required to operate over an infinite number of types; included in this class are object browsers and query tools. The types over which...
Alex Farkas, Alan Dearle
ACSAC
2001
IEEE
15 years 5 months ago
Architecture and Applications for a Distributed Embedded Firewall
The distributed firewall is an important new line of network defense. It provides fine-grained access control to augment the protections afforded by the traditional perimeter fire...
Charles Payne, Tom Markham
105
Voted
ASPLOS
1991
ACM
15 years 5 months ago
The Cache Performance and Optimizations of Blocked Algorithms
Blocking is a well-known optimization technique for improving the effectiveness of memory hierarchies. Instead of operating on entire rows or columns of an array, blocked algorith...
Monica S. Lam, Edward E. Rothberg, Michael E. Wolf
127
Voted
USENIX
2007
15 years 4 months ago
A Comparison of Structured and Unstructured P2P Approaches to Heterogeneous Random Peer Selection
Random peer selection is used by numerous P2P applications; examples include application-level multicast, unstructured file sharing, and network location mapping. In most of thes...
Vivek Vishnumurthy, Paul Francis