Sciweavers

201 search results - page 32 / 41
» Scalability analysis of SPMD codes using expectations
Sort
View
JSC
2010
106views more  JSC 2010»
14 years 10 months ago
Verifying pointer safety for programs with unknown calls
We study the automated verification of pointer safety for heap-manipulating imperative programs with unknown procedure calls. Given a Hoare-style partial correctness specificati...
Chenguang Luo, Florin Craciun, Shengchao Qin, Guan...
ICPP
2009
IEEE
15 years 6 months ago
Integrated Performance Views in Charm++: Projections Meets TAU
Abstract—The Charm++ parallel programming system provides a modular performance interface that can be used to extend its performance measurement and analysis capabilities. The in...
Scott Biersdorff, Chee Wai Lee, Allen D. Malony, L...
SPIESR
1998
151views Database» more  SPIESR 1998»
15 years 1 months ago
Synthesizing Parallel Imaging Applications Using the CAP Computer-Aided Parallelization Tool
Abstract. Imaging applications such as filtering, image transforms and compression/decompression require vast amounts of computing power when applied to large data sets. These appl...
Benoit A. Gennart, Marc Mazzariol, Vincent Messerl...
CONCURRENCY
1998
115views more  CONCURRENCY 1998»
14 years 11 months ago
Falcon: On-line monitoring for steering parallel programs
Abstract Advances in high performance computing, communications, and user interfaces enable developers to construct increasingly interactive high performance applications. The Falc...
Weiming Gu, Greg Eisenhauer, Karsten Schwan, Jeffr...
TCOS
2010
14 years 6 months ago
PET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in Hardware
Abstract. In [24] Raddum and Semaev propose a technique to solve systems of polynomial equations over F2 as occurring in algebraic attacks on block ciphers. This approach is known ...
Willi Geiselmann, Kenneth Matheis, Rainer Steinwan...