Sciweavers

1092 search results - page 70 / 219
» Located Operators
Sort
View
CAV
2009
Springer
177views Hardware» more  CAV 2009»
16 years 2 months ago
Software Transactional Memory on Relaxed Memory Models
Abstract. Pseudo-code descriptions of STMs assume sequentially consistent program execution and atomicity of high-level STM operations like read, write, and commit. These assumptio...
Rachid Guerraoui, Thomas A. Henzinger, Vasu Singh
VTC
2008
IEEE
15 years 8 months ago
Performance of Dedicated Indoor MIMO HSDPA Systems
—MIMO and higher-order modulation (64-QAM) have recently been introduced in the HSPA downlink (HSDPA) to extend peak data rates. Both techniques demand a high SINR operating poin...
Karl J. Molnar, Stephen J. Grant
114
Voted
PVM
2007
Springer
15 years 7 months ago
Revealing the Performance of MPI RMA Implementations
The MPI remote-memory access (RMA) operations provide a different programming model from the regular MPI-1 point-to-point operations. This model is particularly appropriate for ca...
William D. Gropp, Rajeev Thakur
ECRTS
1999
IEEE
15 years 6 months ago
Distributed real-time task monitoring in the safety-critical system Melody
Safety-critical systems typically operate in unpredictable environments. Requirements for safety and reliability are in conflict with those for real-time responsiveness. Due to un...
Horst F. Wedde, Jon A. Lind, Guido Seghert
ISSRE
2007
IEEE
15 years 3 months ago
On the Impact of Injection Triggers for OS Robustness Evaluation
The traditional method of software robustness evaluation, through error injection, is for errors to be injected at reaching a specific code location. This paper studies what impa...
Andréas Johansson, Neeraj Suri, Brendan Mur...