Sciweavers

6149 search results - page 1066 / 1230
» Revealing the programming process
Sort
View
LCPC
2005
Springer
15 years 10 months ago
Revisiting Graph Coloring Register Allocation: A Study of the Chaitin-Briggs and Callahan-Koblenz Algorithms
Techniques for global register allocation via graph coloring have been extensively studied and widely implemented in compiler frameworks. This paper examines a particular variant ā...
Keith D. Cooper, Anshuman Dasgupta, Jason Eckhardt
153
Voted
LOCA
2005
Springer
15 years 10 months ago
Context Obfuscation for Privacy via Ontological Descriptions
Context information is used by pervasive networking and context-aware programs to adapt intelligently to different environments and user tasks. As the context information is poten...
Ryan Wishart, Karen Henricksen, Jadwiga Indulska
OTM
2005
Springer
15 years 10 months ago
Distributed Authentication in GRID5000
Abstract. Between high-performance clusters and grids appears an intermediate infrastructure called cluster grid that corresponds to the interconnection of clusters through the Int...
Sébastien Varrette, Sebastien Georget, Joha...
PVM
2005
Springer
15 years 10 months ago
Collective Error Detection for MPI Collective Operations
Abstract. An MPI profiling library is a standard mechanism for intercepting MPI calls by applications. Profiling libraries are so named because they are commonly used to gather p...
Christopher Falzone, Anthony Chan, Ewing L. Lusk, ...
PVM
2005
Springer
15 years 10 months ago
Implementing Byte-Range Locks Using MPI One-Sided Communication
We present an algorithm for implementing byte-range locks using MPI passive-target one-sided communication. This algorithm is useful in any scenario in which multiple processes of ...
Rajeev Thakur, Robert B. Ross, Robert Latham
« Prev « First page 1066 / 1230 Last » Next »