Sciweavers

2512 search results - page 299 / 503
» Software Transactional Memory
Sort
View
ECIS
2003
15 years 5 months ago
Strategies to reduce information asymmetry in web service market
The web service model provides fundamental advantages compared to the classical software usage model. But transactions in the web service market have by far not reached the expect...
Gerrit Tamm, Maria Wünsche
IICAI
2003
15 years 5 months ago
Machine Learning in Infrastructure Security
Abstract: Democratic societies throughout the world, it appears, are facing a new type of threat dubbed "asymmetric threat." In this new threat environment the world gove...
V. Rao Vemuri
ENTCS
2007
113views more  ENTCS 2007»
15 years 4 months ago
Modular Checkpointing for Atomicity
Transient faults that arise in large-scale software systems can often be repaired by re-executing the code in which they occur. Ascribing a meaningful semantics for safe re-execut...
Lukasz Ziarek, Philip Schatz, Suresh Jagannathan
PDP
2009
IEEE
15 years 11 months ago
Adding Aspect-Oriented Concepts to the High-Performance Component Model of SBASCO
SBASCO provides a new programming model for parallel and distributed numerical applications which exploits the combination of software components and skeletons. This paper present...
Manuel Díaz, Sergio Romero, Bartolomé...
ICPP
2009
IEEE
15 years 11 months ago
Mapping the FDTD Application to Many-Core Chip Architectures
—This paper reports a study of mapping the Finite Difference Time Domain (FDTD) application to the IBM Cyclops64 (C64) many-core chip architecture [1]. C64 is chosen for this stu...
Daniel Orozco, Guang R. Gao