Sciweavers

987 search results - page 148 / 198
» Implementing an untrusted operating system on trusted hardwa...
Sort
View
CAV
2009
Springer
206views Hardware» more  CAV 2009»
14 years 9 months ago
D-Finder: A Tool for Compositional Deadlock Detection and Verification
D-Finder tool implements a compositional method for the verification of component-based systems described in BIP language encompassing multi-party interaction. For deadlock detecti...
Saddek Bensalem, Marius Bozga, Thanh-Hung Nguyen, ...
SOSP
1993
ACM
13 years 10 months ago
Improving IPC by Kernel Design
Inter-process communication (ipc) has to be fast and e ective, otherwise programmers will not use remote procedure calls(RPC),multithreadingand multitasking adequately. Thus ipc p...
Jochen Liedtke
IPPS
2010
IEEE
13 years 6 months ago
Overlapping computation and communication: Barrier algorithms and ConnectX-2 CORE-Direct capabilities
Abstract--This paper explores the computation and communication overlap capabilities enabled by the new CORE-Direct hardware capabilities introduced in the InfiniBand (IB) Host Cha...
Richard L. Graham, Stephen W. Poole, Pavel Shamis,...
CORR
2011
Springer
259views Education» more  CORR 2011»
13 years 3 months ago
Automatic Optimization for MapReduce Programs
The MapReduce distributed programming framework has become popular, despite evidence that current implementations are inefficient, requiring far more hardware than a traditional r...
Eaman Jahani, Michael J. Cafarella, Christopher R&...
CODES
2006
IEEE
14 years 2 months ago
Key technologies for the next generation wireless communications
The principal objectives of next generation wireless communication are the delivery of higher data rate services including video, audio, data and voice signals with worldwide comp...
Kyung-Ho Kim