Sciweavers

403 search results - page 42 / 81
» On Using Incremental Profiling for the Performance Analysis ...
Sort
View
HPCA
2006
IEEE
14 years 9 months ago
InfoShield: a security architecture for protecting information usage in memory
Cyber theft is a serious threat to Internet security. It is one of the major security concerns by both network service providers and Internet users. Though sensitive information c...
Guofei Gu, Hsien-Hsin S. Lee, Joshua B. Fryman, Ju...
PODC
1999
ACM
14 years 1 months ago
LOTEC: A Simple DSM Consistency Protocol for Nested Object Transactions
In this paper, we describe an e cient software-only Distributed Shared Memory (DSM) consistency protocol for an unconventional but important application domain - object transactio...
Peter C. J. Graham, Yahong Sui
SC
2004
ACM
14 years 2 months ago
A Parallel Implementation of 4-Dimensional Haralick Texture Analysis for Disk-Resident Image Datasets
Texture analysis is one possible method to detect features in biomedical images. During texture analysis, texture related information is found by examining local variations in ima...
Brent Woods, Bradley D. Clymer, Joel H. Saltz, Tah...
CLUSTER
2009
IEEE
14 years 3 months ago
Investigating the use of GPU-accelerated nodes for SAR image formation
The computation of an electromagnetic reflectivity image from a set of radar returns is a computationally intensive process. Therefore, the use of high performance computing is r...
Timothy D. R. Hartley, Ahmed Fasih, Charles A. Ber...
ICS
2001
Tsinghua U.
14 years 1 months ago
Tools for application-oriented performance tuning
Application performance tuning is a complex process that requires assembling various types of information and correlating it with source code to pinpoint the causes of performance...
John M. Mellor-Crummey, Robert J. Fowler, David B....