Sciweavers

40 search results - page 8 / 8
» ppl 2006
Sort
View
86
Voted
PPL
2007
150views more  PPL 2007»
14 years 12 months ago
Open MPI: a High Performance, Flexible Implementation of MPI Point-to-Point Communications
’s point-to-point communications abstractions, described in this paper, handle several different communications scenarios, with a portable, high-performance design and tation. ...
Richard L. Graham, Brian Barrett, Galen M. Shipman...
131
Voted
PPL
2010
147views more  PPL 2010»
14 years 10 months ago
Key Distribution versus Key Enhancement in Quantum Cryptography
It has been said that quantum cryptography in general o ers a secure solution to the problem of key enhancement. This means that two parties who already share a small secret key, ...
Naya Nagy, Marius Nagy, Selim G. Akl
EDBT
2006
ACM
95views Database» more  EDBT 2006»
16 years 16 days ago
On Exploring the Power-Law Relationship in the Itemset Support Distribution
Abstract. We identify and explore in this paper an important phenomenon which points out that the power-law relationship appears in the distribution of itemset supports. Characteri...
Kun-Ta Chuang, Jiun-Long Huang, Ming-Syan Chen
97
Voted
PPL
2006
93views more  PPL 2006»
15 years 10 days ago
Inherently Parallel Geometric Computations
A new computational paradigm is described which o ers the possibility of superlinear and sometimes unbounded speedup, when parallel computation is used. The computations involved ...
Selim G. Akl
97
Voted
PPL
2007
86views more  PPL 2007»
14 years 12 months ago
Failure-Sensitive Analysis of Parallel Algorithms with Controlled Memory Access Concurrency
ract problem of using P failure-prone processors to cooperatively update all locations of an N-element shared array is called Write-All. Solutions to Write-All can be used iterati...
Chryssis Georgiou, Alexander Russell, Alexander A....