Sciweavers

699 search results - page 107 / 140
» mc 2008
Sort
View
ISPASS
2008
IEEE
15 years 6 months ago
Investigating the TLB Behavior of High-end Scientific Applications on Commodity Microprocessors
The floating point portion of the SPEC CPU suite and the HPC Challenge suite are widely recognized and utilized as benchmarks that represent scientific application behavior. In th...
Collin McCurdy, Alan L. Cox, Jeffrey S. Vetter
APPROX
2008
Springer
101views Algorithms» more  APPROX 2008»
15 years 2 months ago
Streaming Algorithms for k-Center Clustering with Outliers and with Anonymity
Clustering is a common problem in the analysis of large data sets. Streaming algorithms, which make a single pass over the data set using small working memory and produce a cluster...
Richard Matthew McCutchen, Samir Khuller
110
Voted
ANSS
2008
IEEE
15 years 7 months ago
Executable Protocol Models as a Requirements Engineering Tool
Functional prototypes and simulations are a well recognised and valued tool for building a shared understanding of requirements between users and developers. However, the developm...
Ashley T. McNeile, Ella E. Roubtsova
101
Voted
ASPLOS
2008
ACM
15 years 2 months ago
How low can you go?: recommendations for hardware-supported minimal TCB code execution
We explore the extent to which newly available CPU-based security technology can reduce the Trusted Computing Base (TCB) for security-sensitive applications. We find that although...
Jonathan M. McCune, Bryan Parno, Adrian Perrig, Mi...
GECCO
2008
Springer
154views Optimization» more  GECCO 2008»
15 years 1 months ago
Cooperative network construction using digital germlines
This paper describes a study in the evolution of cooperative behavior, specifically the construction of communication networks, through digital evolution and multilevel selection...
David B. Knoester, Philip K. McKinley, Charles Ofr...