Sciweavers

1389 search results - page 206 / 278
» Parallel Algorithms for Treewidth Two
Sort
View
AES
2000
Springer
117views Cryptology» more  AES 2000»
15 years 2 months ago
A Comparison of AES Candidates on the Alpha 21264
We compare the five candidates for the Advanced Encryption Standard based on their performance on the Alpha 21264, a 64-bit superscalar processor. There are several new features o...
Richard Weiss, Nathan L. Binkert
HPDC
1999
IEEE
15 years 2 months ago
Baglets: Adding Hierarchical Scheduling to Aglets
A significant number of new Java-based technologies for mobile code (aka agents) have recently emerged. The 'Aglets' system, from IBM's research labs, provides an e...
Arvind Gopalan, Sajid Saleem, Matthias Martin, Dan...
ICDCS
1999
IEEE
15 years 2 months ago
Active Correlation Tracking
We describe methods of identifying and exploiting sharing patterns in multi-threaded DSM applications. Active correlation tracking is used to determine the affinity, or amount of ...
Kritchalach Thitikamol, Peter J. Keleher
IPPS
1996
IEEE
15 years 1 months ago
Kiloprocessor Extensions to SCI
To expand the Scalable Coherent Interface's (SCI) capabilities so it can be used to efficiently handle sharing in systems of hundreds or even thousands of processors, the SCI...
Stefanos Kaxiras
CONCUR
2007
Springer
15 years 1 months ago
Temporal Antecedent Failure: Refining Vacuity
We re-examine vacuity in temporal logic model checking. We note two disturbing phenomena in recent results in this area. The first indicates that not all vacuities detected in prac...
Shoham Ben-David, Dana Fisman, Sitvanit Ruah