Sciweavers

899 search results - page 156 / 180
» Dependence Analysis of Parallel and Distributed Programs and...
Sort
View
IPPS
2009
IEEE
14 years 2 months ago
Input-independent, scalable and fast string matching on the Cray XMT
String searching is at the core of many security and network applications like search engines, intrusion detection systems, virus scanners and spam filters. The growing size of o...
Oreste Villa, Daniel G. Chavarría-Miranda, ...
ISCA
1997
IEEE
96views Hardware» more  ISCA 1997»
13 years 11 months ago
DataScalar Architectures
DataScalar architectures improve memory system performance by running computation redundantly across multiple processors, which are each tightly coupled with an associated memory....
Doug Burger, Stefanos Kaxiras, James R. Goodman
ASPLOS
2004
ACM
14 years 25 days ago
HOIST: a system for automatically deriving static analyzers for embedded systems
Embedded software must meet conflicting requirements such as being highly reliable, running on resource-constrained platforms, and being developed rapidly. Static program analysi...
John Regehr, Alastair Reid
EMSOFT
2004
Springer
14 years 24 days ago
Reactive process networks
Data flow process networks are a good model of computation for streaming multimedia applications incorporating audio, video and/or graphics streams. Process networks are concurre...
Marc Geilen, Twan Basten
CN
2011
331views more  CN 2011»
13 years 1 months ago
P2P vs. IP multicast: Comparing approaches to IPTV streaming based on TV channel popularity
Already a popular application in the Internet, IPTV is becoming, among the service providers, a preferred alternative to conventional broadcasting technologies. Since many of the ...
Alex Bikfalvi, Jaime García-Reinoso, Iv&aac...