Sciweavers

1029 search results - page 188 / 206
» Dependence Anti Patterns
Sort
View
ASIAN
2004
Springer
150views Algorithms» more  ASIAN 2004»
14 years 1 months ago
Concurrent Constraint-Based Memory Machines: A Framework for Java Memory Models
A central problem in extending the von Neumann architecture to petaflop computers with millions of hardware threads and with a shared memory is defining the memory model [Lam79,...
Vijay A. Saraswat
ESORICS
2004
Springer
14 years 1 months ago
Discovering Novel Attack Strategies from INFOSEC Alerts
Abstract. Correlating security alerts and discovering attack strategies are important and challenging tasks for security analysts. Recently, there have been several proposed techni...
Xinzhou Qin, Wenke Lee
ICS
2004
Tsinghua U.
14 years 1 months ago
Applications of storage mapping optimization to register promotion
Storage mapping optimization is a flexible approach to folding array dimensions in numerical codes. It is designed to reduce the memory footprint after a wide spectrum of loop tr...
Patrick Carribault, Albert Cohen
ICPP
2003
IEEE
14 years 27 days ago
Dynamic Control Frames in Reservation-Based Packet Scheduling for Single-Hop WDM Networks
In reservation-based packet scheduling algorithms for single-hop WDM networks, one of the wavelengths is used as a control channel which is shared by all of the nodes for transmit...
Hwa-Chun Lin, Pei-Shin Liu
RTSS
2003
IEEE
14 years 27 days ago
Adaptive Coherency Maintenance Techniques for Time-Varying Data
Often, data used in on-line decision making (for example, in determining how to react to changes in process behavior, traffic flow control, etc.) is dynamic in nature and hence ...
Ratul kr. Majumdar, Kannan M. Moudgalya, Krithi Ra...