Sciweavers

561 search results - page 53 / 113
» A Strategy for the Computation of Conditional Answers
Sort
View
IPPS
1999
IEEE
14 years 1 months ago
Relaxing Causal Constraints in PDES
One of the major overheads that prohibits the wide spread deployment of parallel discrete event simulation PDES is the need to synchronize the distributed processes in the simulat...
Narayanan V. Thondugulam, Dhananjai Madhava Rao, R...
JSSPP
1997
Springer
14 years 1 months ago
Implications of I/O for Gang Scheduled Workloads
This paper examinestheimplicationsofgang schedulingfor generalpurpose multiprocessors. The workloads in these environments include both compute-bound parallel jobs, which often re...
Walter Lee, Matthew Frank, Victor Lee, Kenneth Mac...
COCO
2009
Springer
117views Algorithms» more  COCO 2009»
14 years 3 months ago
The Proof Complexity of Polynomial Identities
Devising an efficient deterministic – or even a nondeterministic sub-exponential time – algorithm for testing polynomial identities is a fundamental problem in algebraic comp...
Pavel Hrubes, Iddo Tzameret
RECOMB
2009
Springer
14 years 9 months ago
A Robust Bayesian Two-Sample Test for Detecting Intervals of Differential Gene Expression in Microarray Time Series
Abstract. Understanding the regulatory mechanisms that are responsible for an organism's response to environmental changes is an important question in molecular biology. A fir...
Oliver Stegle, Katherine J. Denby, David L. Wild, ...
STOC
2005
ACM
110views Algorithms» more  STOC 2005»
14 years 9 months ago
Key agreement from weak bit agreement
Assume that Alice and Bob, given an authentic channel, have a protocol where they end up with a bit SA and SB, respectively, such that with probability 1+ 2 these bits are equal. ...
Thomas Holenstein