Sciweavers

5790 search results - page 969 / 1158
» Distributed programming with distributed authorization
Sort
View
CLUSTER
2003
IEEE
14 years 3 months ago
Coordinated Checkpoint versus Message Log for Fault Tolerant MPI
— Large Clusters, high availability clusters and Grid deployments often suffer from network, node or operating system faults and thus require the use of fault tolerant programmin...
Aurelien Bouteiller, Pierre Lemarinier, Gér...
ISCA
2010
IEEE
219views Hardware» more  ISCA 2010»
14 years 3 months ago
Using hardware vulnerability factors to enhance AVF analysis
Fault tolerance is now a primary design constraint for all major microprocessors. One step in determining a processor’s compliance to its failure rate target is measuring the Ar...
Vilas Sridharan, David R. Kaeli
PPPJ
2009
ACM
14 years 3 months ago
Virtual reuse distance analysis of SPECjvm2008 data locality
Reuse distance analysis has been proved promising in evaluating and predicting data locality for programs written in Fortran or C/C++. But its effect has not been examined for ap...
Xiaoming Gu, Xiao-Feng Li, Buqi Cheng, Eric Huang
ICS
2009
Tsinghua U.
14 years 3 months ago
A translation system for enabling data mining applications on GPUs
Modern GPUs offer much computing power at a very modest cost. Even though CUDA and other related recent developments are accelerating the use of GPUs for general purpose applicati...
Wenjing Ma, Gagan Agrawal
INAP
2001
Springer
14 years 2 months ago
iML: A Logic-based Framework for Constructing Graphical User Interface on Mobile Agents
Mobile agent technology is an emerging technology that allows easier design, implementation, and maintenance of distributed systems. Mobility enables agents to reduce network load,...
Naoki Fukuta, Nobuaki Mizutani, Tadachika Ozono, T...