Sciweavers

5109 search results - page 846 / 1022
» On Learning Limiting Programs
Sort
View
SPAA
2010
ACM
15 years 9 months ago
Simplifying concurrent algorithms by exploiting hardware transactional memory
We explore the potential of hardware transactional memory (HTM) to improve concurrent algorithms. We illustrate a number of use cases in which HTM enables significantly simpler c...
Dave Dice, Yossi Lev, Virendra J. Marathe, Mark Mo...
DCOSS
2010
Springer
15 years 9 months ago
Stateful Mobile Modules for Sensor Networks
Most sensor network applications are dominated by the acquisition of sensor values. Due to energy limitations and high energy costs of communication, in-network processing has been...
Moritz Strübe, Rüdiger Kapitza, Klaus St...
MOBILITY
2009
ACM
15 years 9 months ago
Context adaptative systems based on horizontal architecture for ubiquitous computing
Many adaptative context-aware middleware exist and mostly rely on so-called vertical architectures that offer a functional decomposition for context-awareness. This architecture ...
Nicolas Ferry, Stephane Lavirotte, Jean-Yves Tigli...
SPAA
2009
ACM
15 years 9 months ago
Brief announcement: a lower bound for depth-restricted work stealing
Work stealing is a common technique used in the runtime schedulers of parallel languages such as Cilk and parallel libraries such as Intel Threading Building Blocks (TBB). Depth-r...
Jim Sukha
FPL
2001
Springer
102views Hardware» more  FPL 2001»
15 years 8 months ago
Technology Trends and Adaptive Computing
System and processor architectures depend on changes in technology. Looking ahead as die density and speed increase, power consumption and on chip interconnection delay become incr...
Michael J. Flynn, Albert A. Liddicoat