Sciweavers

1222 search results - page 100 / 245
» Verifying a File System Implementation
Sort
View
129
Voted
ICPADS
2010
IEEE
15 years 17 days ago
Effective Performance Measurement at Petascale Using IPM
As supercomputers are being built from an ever increasing number of processing elements, the effort required to achieve a substantial fraction of the system peak performance is con...
Karl Fürlinger, Nicholas J. Wright, David Ski...
119
Voted
VMCAI
2004
Springer
15 years 8 months ago
Approximate Probabilistic Model Checking
In this paper we deal with the problem of applying model checking to real programs. We verify a program without constructing the whole transition system using a technique based on...
Thomas Hérault, Richard Lassaigne, Fr&eacut...
85
Voted
WWW
2001
ACM
16 years 3 months ago
Building a distributed full-text index for the Web
We identify crucial design issues in building a distributed inverted index for a large collection of web pages. We introduce a novel pipelining technique for structuring the core ...
Sergey Melnik, Sriram Raghavan, Beverly Yang, Hect...
106
Voted
CCGRID
2003
IEEE
15 years 8 months ago
Noncontiguous I/O Accesses Through MPI-IO
I/O performance remains a weakness of parallel computing systems today. While this weakness is partly attributed to rapid advances in other system components, I/O interfaces avail...
Avery Ching, Alok N. Choudhary, Kenin Coloma, Wei-...
125
Voted
JCP
2008
116views more  JCP 2008»
15 years 2 months ago
Formal Verification and Visualization of Security Policies
Verified and validated security policies are essential components of high assurance computer systems. The design and implementation of security policies are fundamental processes i...
Luay A. Wahsheh, Daniel Conte de Leon, Jim Alves-F...