Sciweavers

7430 search results - page 102 / 1486
» Programming Applications in CIFF
Sort
View
PPOPP
2009
ACM
14 years 10 months ago
How much parallelism is there in irregular applications?
Irregular programs are programs organized around pointer-based data structures such as trees and graphs. Recent investigations by the Galois project have shown that many irregular...
Milind Kulkarni, Martin Burtscher, Rajeshkar Inkul...
ISCA
2007
IEEE
192views Hardware» more  ISCA 2007»
14 years 4 months ago
Analysis of redundancy and application balance in the SPEC CPU2006 benchmark suite
The recently released SPEC CPU2006 benchmark suite is expected to be used by computer designers and computer architecture researchers for pre-silicon early design analysis. Partia...
Aashish Phansalkar, Ajay Joshi, Lizy Kurian John
SIAMJO
2008
100views more  SIAMJO 2008»
13 years 9 months ago
On Extension of Fenchel Duality and its Application
By considering the epigraphs of conjugate functions, we extend the Fenchel duality, applicable to a (possibly infinite) family of proper lower semicontinuous convex functions on a ...
Anhua Lin, Guoyin Li, Kung Fu Ng
WSC
1997
13 years 11 months ago
Taking the Work Out of Simulation Modeling: An Application of Technology Integration
This paper presents an implementation methodology appropriate for providing a broad range of proven, classical Operations Research methods and techniques to the simulation modeler...
Gregory S. Baker
WETICE
1997
IEEE
14 years 1 months ago
Providing Secure Environments for Untrusted Network Applications
: Bugs in network application program can be exploited to compromise the system on which the application is running. When running these applications in an unsafe environment such a...
Qun Zhong