Sciweavers

2290 search results - page 335 / 458
» Extensible Protected Types
Sort
View
131
Voted
CLUSTER
2009
IEEE
15 years 9 months ago
Integrating software distributed shared memory and message passing programming
Abstract—Software Distributed Shared Memory (SDSM) systems provide programmers with a shared memory programming environment across distributed memory architectures. In contrast t...
H'sien J. Wong, Alistair P. Rendell
108
Voted
SASP
2009
IEEE
222views Hardware» more  SASP 2009»
15 years 9 months ago
Arithmetic optimization for custom instruction set synthesis
Abstract—One of the ways that custom instruction set extensions can improve over software execution is through the use of hardware structures that have been optimized at the arit...
Ajay K. Verma, Yi Zhu, Philip Brisk, Paolo Ienne
115
Voted
P2P
2009
IEEE
120views Communications» more  P2P 2009»
15 years 9 months ago
A Flexible Divide-And-Conquer Protocol for Multi-View Peer-to-Peer Live Streaming
Abstract—Multi-view peer-to-peer (P2P) live streaming systems have recently emerged, where a user can simultaneously watch multiple channels. Previous work on multi-view P2P stre...
Miao Wang, Lisong Xu, Byrav Ramamurthy
123
Voted
ICSM
2009
IEEE
15 years 9 months ago
Detection and analysis of near-miss software clones
Software clones are considered harmful in software maintenance and evolution. However, despite a decade of active research, there is a marked lack of work in the detection and ana...
Chanchal K. Roy
AMMA
2009
Springer
15 years 9 months ago
Manipulating Scrip Systems: Sybils and Collusion
Abstract. Game-theoretic analyses of distributed and peer-to-peer systems typically use the Nash equilibrium solution concept, but this explicitly excludes the possibility of strat...
Ian A. Kash, Eric J. Friedman, Joseph Y. Halpern