Sciweavers

1432 search results - page 217 / 287
» Executable Protocol Models as a Requirements Engineering Too...
Sort
View
138
Voted
CPHYSICS
2007
71views more  CPHYSICS 2007»
15 years 3 months ago
Simulation of n-qubit quantum systems. III. Quantum operations
During the last decade, several quantum information protocols, such as quantum key distribution, teleportation or quantum computation, have attracted a lot of interest. Despite th...
T. Radtke, S. Fritzsche
SIGMETRICS
1996
ACM
118views Hardware» more  SIGMETRICS 1996»
15 years 8 months ago
Integrating Performance Monitoring and Communication in Parallel Computers
A large and increasing gap exists between processor and memory speeds in scalable cache-coherent multiprocessors. To cope with this situation, programmers and compiler writers mus...
Margaret Martonosi, David Ofelt, Mark Heinrich
ASPLOS
2004
ACM
15 years 9 months ago
Low-overhead memory leak detection using adaptive statistical profiling
Sampling has been successfully used to identify performance optimization opportunities. We would like to apply similar techniques to check program correctness. Unfortunately, samp...
Matthias Hauswirth, Trishul M. Chilimbi
124
Voted
RCC
2000
113views more  RCC 2000»
15 years 3 months ago
The Aristotle Approach to Open Hypermedia
Large-scale distributed hypermedia systems comprise a generation of powerful tools to meet the demands of the new information globalization era. The most promising of such systems...
Costas Petrou, Drakoulis Martakos, Michael Hatzopo...
ICPADS
2005
IEEE
15 years 9 months ago
Distributed Integrity Checking for Systems with Replicated Data
This work presents a new comparison-based diagnosis model and a new algorithm, called Hi-Dif, based on this model. The algorithm is used for checking the integrity of systems with...
Roverli Pereira Ziwich, Elias Procópio Duar...