Sciweavers

1914 search results - page 340 / 383
» Using Execution Trace Data to Improve Distributed Systems
Sort
View
CCS
2008
ACM
14 years 11 months ago
Authenticated hash tables
Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores n elements in a hash table that is outsourced at a remote server so t...
Charalampos Papamanthou, Roberto Tamassia, Nikos T...
IPPS
2008
IEEE
15 years 4 months ago
Lattice Boltzmann simulation optimization on leading multicore platforms
We present an auto-tuning approach to optimize application performance on emerging multicore architectures. The methodology extends the idea of searchbased performance optimizatio...
Samuel Williams, Jonathan Carter, Leonid Oliker, J...
ICDCS
2000
IEEE
15 years 2 months ago
Scalable QoS Guaranteed Communication Services for Real-Time Applications
In this paper, we propose an approach to flow-unaware admission control, which is combination with an aggregate packet forwarding scheme, improves scalability of networks while g...
Byung-Kyu Choi, Dong Xuan, Chengzhi Li, Riccardo B...
LCTRTS
2009
Springer
15 years 4 months ago
Guaranteeing instruction fetch behavior with a lookahead instruction fetch engine (LIFE)
Instruction fetch behavior has been shown to be very regular and predictable, even for diverse application areas. In this work, we propose the Lookahead Instruction Fetch Engine (...
Stephen Roderick Hines, Yuval Peress, Peter Gavin,...
CLUSTER
2008
IEEE
15 years 4 months ago
Impact of topology and link aggregation on a PC cluster with Ethernet
Abstract—In addition to its use in local area networks, Ethernet has been used for connecting hosts in the area of highperformance computing. Here, we investigated the impact of ...
Takafumi Watanabe, Masahiro Nakao, Tomoyuki Hiroya...