Sciweavers

13383 search results - page 2359 / 2677
» Abstractions from proofs
Sort
View
ISPASS
2010
IEEE
15 years 1 months ago
Weak execution ordering - exploiting iterative methods on many-core GPUs
Abstract--On NVIDIA's many-core GPUs, there is no synchronization function among parallel thread blocks. When finegranularity of data communication and synchronization is requ...
Jianmin Chen, Zhuo Huang, Feiqi Su, Jih-Kwon Peir,...
MICRO
2010
IEEE
172views Hardware» more  MICRO 2010»
15 years 1 months ago
Architectural Support for Fair Reader-Writer Locking
Abstract--Many shared-memory parallel systems use lockbased synchronization mechanisms to provide mutual exclusion or reader-writer access to memory locations. Software locks are i...
Enrique Vallejo, Ramón Beivide, Adriá...
P2P
2010
IEEE
136views Communications» more  P2P 2010»
15 years 1 months ago
On the Privacy of Peer-Assisted Distribution of Security Patches
Abstract--When a host discovers that it has a software vulnerability that is susceptible to an attack, the host needs to obtain and install a patch. Because centralized distributio...
Di Wu, Cong Tang, Prithula Dhungel, Nitesh Saxena,...
SAICSIT
2010
ACM
15 years 1 months ago
Determining requirements within an indigenous knowledge system of African rural communities
Eliciting and analyzing requirements within knowledge systems, which fundamentally differ so far from technology supported systems represent particular challenges. African rural c...
Heike Winschiers-Theophilus, Nicola J. Bidwell, Sh...
UM
2010
Springer
15 years 1 months ago
Mobile Web Profiling: A Study of Off-Portal Surfing Habits of Mobile Users
Abstract. The World Wide Web has provided users with the opportunity to access from any computer the largest set of information ever existing. Researchers have analyzed how such us...
Daniel Olmedilla, Enrique Frías-Martí...
« Prev « First page 2359 / 2677 Last » Next »