Sciweavers

5790 search results - page 1041 / 1158
» Distributed programming with distributed authorization
Sort
View
ICS
2009
Tsinghua U.
14 years 1 months ago
Single-particle 3d reconstruction from cryo-electron microscopy images on GPU
Single-particle 3D reconstruction from cryo-electron microscopy (cryo-EM) images is a kernel application of biological molecules analysis, as the computational requirement of whic...
Guangming Tan, Ziyu Guo, Mingyu Chen, Dan Meng
EUROPAR
2001
Springer
14 years 1 months ago
Performance of High-Accuracy PDE Solvers on a Self-Optimizing NUMA Architecture
High-accuracy PDE solvers use multi-dimensional fast Fourier transforms. The FFTs exhibits a static and structured memory access pattern which results in a large amount of communic...
Sverker Holmgren, Dan Wallin
LCPC
2001
Springer
14 years 1 months ago
Probabilistic Points-to Analysis
Information gathered by the existing pointer analysis techniques can be classified as must aliases or definitely-points-to relationships, which hold for all executions, and may a...
Yuan-Shin Hwang, Peng-Sheng Chen, Jenq Kuen Lee, R...
TES
2001
Springer
14 years 1 months ago
Peer-to-Peer Traced Execution of Composite Services
Abstract. The connectivity generated by the Internet is opening unprecedented opportunities of automating business-to-business collaborations. As a result, organisations of all siz...
Marie-Christine Fauvet, Marlon Dumas, Boualem Bena...
PADS
2000
ACM
14 years 1 months ago
Applying parallel discrete event simulation to network emulation
The simulation of wide area computer networks is one area where the benefits of parallel simulation have been clearly demonstrated. Here we present a description of a system that...
Rob Simmonds, Russell Bradford, Brian Unger
« Prev « First page 1041 / 1158 Last » Next »