Sciweavers

3836 search results - page 528 / 768
» Optimizing the Use of High Performance Software Libraries
Sort
View
ICDCS
1995
IEEE
15 years 8 months ago
Specifying Weak Sets
nt formal speci cations of a new abstraction, weak sets, which can be used to alleviate high latencies when retrieving data from a wide-area information system like the World Wide...
Jeannette M. Wing, David C. Steere
EUROSYS
2010
ACM
16 years 1 months ago
Delay Scheduling: A Simple Technique for Achieving Locality and Fairness in Cluster Scheduling
As organizations start to use data-intensive cluster computing systems like Hadoop and Dryad for more applications, there is a growing need to share clusters between users. Howeve...
Matei Zaharia, Dhruba Borthakur, Joydeep Sen Sarma...
122
Voted
MICCAI
2000
Springer
15 years 8 months ago
Pre- and Intra-operative Planning and Simulation of Percutaneous Tumor Ablation
We developed a software tool for pre-operative simulation and planning, and intra-operative guidance, of minimally invasive tumor ablation, including radiofrequency-, laser- and cr...
Torsten Butz, Simon K. Warfield, Kemal Tuncali, St...
MICRO
2008
IEEE
103views Hardware» more  MICRO 2008»
15 years 11 months ago
Testudo: Heavyweight security analysis via statistical sampling
Heavyweight security analysis systems, such as taint analysis and dynamic type checking, are powerful technologies used to detect security vulnerabilities and software bugs. Tradi...
Joseph L. Greathouse, Ilya Wagner, David A. Ramos,...
ISPD
2004
ACM
134views Hardware» more  ISPD 2004»
15 years 10 months ago
Performance-driven register insertion in placement
As the CMOS technology is scaled into the dimension of nanometer, the clock frequencies and die sizes of ICs are shown to be increasing steadily [5]. Today, global wires that requ...
Dennis K. Y. Tong, Evangeline F. Y. Young