Sciweavers

1092 search results - page 70 / 219
» Located Operators
Sort
View
CAV
2009
Springer
177views Hardware» more  CAV 2009»
14 years 10 months ago
Software Transactional Memory on Relaxed Memory Models
Abstract. Pseudo-code descriptions of STMs assume sequentially consistent program execution and atomicity of high-level STM operations like read, write, and commit. These assumptio...
Rachid Guerraoui, Thomas A. Henzinger, Vasu Singh
VTC
2008
IEEE
14 years 4 months ago
Performance of Dedicated Indoor MIMO HSDPA Systems
—MIMO and higher-order modulation (64-QAM) have recently been introduced in the HSPA downlink (HSDPA) to extend peak data rates. Both techniques demand a high SINR operating poin...
Karl J. Molnar, Stephen J. Grant
PVM
2007
Springer
14 years 4 months ago
Revealing the Performance of MPI RMA Implementations
The MPI remote-memory access (RMA) operations provide a different programming model from the regular MPI-1 point-to-point operations. This model is particularly appropriate for ca...
William D. Gropp, Rajeev Thakur
ECRTS
1999
IEEE
14 years 2 months ago
Distributed real-time task monitoring in the safety-critical system Melody
Safety-critical systems typically operate in unpredictable environments. Requirements for safety and reliability are in conflict with those for real-time responsiveness. Due to un...
Horst F. Wedde, Jon A. Lind, Guido Seghert
ISSRE
2007
IEEE
13 years 11 months ago
On the Impact of Injection Triggers for OS Robustness Evaluation
The traditional method of software robustness evaluation, through error injection, is for errors to be injected at reaching a specific code location. This paper studies what impa...
Andréas Johansson, Neeraj Suri, Brendan Mur...