Sciweavers

3638 search results - page 55 / 728
» Distribution chain security
Sort
View
IPPS
2010
IEEE
13 years 7 months ago
On the parallelisation of MCMC by speculative chain execution
Abstract--The increasing availability of multi-core and multiprocessor architectures provides new opportunities for improving the performance of many computer simulations. Markov C...
Jonathan M. R. Byrd, Stephen A. Jarvis, Abhir H. B...
IEEEPACT
2006
IEEE
14 years 3 months ago
An empirical evaluation of chains of recurrences for array dependence testing
Code restructuring compilers rely heavily on program analysis techniques to automatically detect data dependences between program statements. Dependences between statement instanc...
Johnnie Birch, Robert A. van Engelen, Kyle A. Gall...
IPPS
2005
IEEE
14 years 2 months ago
A Dependency Chain Clustered Microarchitecture
In this paper we explore a new clustering approach for reducing the complexity of wide issue in-order processors based on EPIC architectures. Complexity effectiveness is achieved ...
Satish Narayanasamy, Hong Wang 0003, Perry H. Wang...
ICRA
2003
IEEE
165views Robotics» more  ICRA 2003»
14 years 2 months ago
Multi-robot task-allocation through vacancy chains
Existing task allocation algorithms generally do not consider the effects of task interaction, such as interference, but instead assume that tasks are independent. That assumptio...
Torbjørn S. Dahl, Maja J. Mataric, Gaurav S...
ECIS
2000
13 years 10 months ago
Evaluating Information Sharing Strategies in Supply Chains
This paper evaluates the impact of information sharing strategies on the performance of a supply chain. We consider three forms of information sharing strategies: (1) order informa...
Jingquan Li, Michael J. Shaw, Gek Woo Tan