Sciweavers

6274 search results - page 1089 / 1255
» Proofs, Programs, Processes
Sort
View
PVM
2005
Springer
14 years 4 months ago
Collective Error Detection for MPI Collective Operations
Abstract. An MPI profiling library is a standard mechanism for intercepting MPI calls by applications. Profiling libraries are so named because they are commonly used to gather p...
Christopher Falzone, Anthony Chan, Ewing L. Lusk, ...
PVM
2005
Springer
14 years 4 months ago
Implementing Byte-Range Locks Using MPI One-Sided Communication
We present an algorithm for implementing byte-range locks using MPI passive-target one-sided communication. This algorithm is useful in any scenario in which multiple processes of ...
Rajeev Thakur, Robert B. Ross, Robert Latham
RTA
2005
Springer
14 years 4 months ago
Intruder Deduction for AC-Like Equational Theories with Homomorphisms
Cryptographic protocols are small programs which involve a high level of concurrency and which are difficult to analyze by hand. The most successful methods to verify such protocol...
Pascal Lafourcade, Denis Lugiez, Ralf Treinen
STACS
2005
Springer
14 years 4 months ago
Cycle Cover with Short Cycles
Cycle covering is a well-studied problem in computer science. In this paper, we develop approximation algorithms for variants of cycle covering problems which bound the size and/o...
Nicole Immorlica, Mohammad Mahdian, Vahab S. Mirro...
GECCO
2005
Springer
150views Optimization» more  GECCO 2005»
14 years 4 months ago
A GA for maximum likelihood phylogenetic inference using neighbour-joining as a genotype to phenotype mapping
Evolutionary relationships among species can be represented by a phylogenetic tree and inferred by optimising some measure of fitness, such as the statistical likelihood of the t...
Leon Poladian
« Prev « First page 1089 / 1255 Last » Next »