Sciweavers

1821 search results - page 201 / 365
» Security-Aware Program Transformations
Sort
View
CORR
2010
Springer
136views Education» more  CORR 2010»
13 years 9 months ago
A Reflective Approach to Providing Flexibility in Application Distribution
Current middleware systems suffer from drawbacks. Often one is forced to make decisions early in the design process about which classes may participate in inter-machine communicat...
Álvaro J. Rebón Portillo, Scott M. W...
IJPP
1998
91views more  IJPP 1998»
13 years 9 months ago
Reuse-Driven Tiling for Improving Data Locality
This paper applies unimodular transformations and tiling to improve data locality of a loop nest. Due to data dependences and reuse information, not all dimensions of the iteration...
Jingling Xue, Chua-Huang Huang
ICS
2009
Tsinghua U.
14 years 4 months ago
MPI-aware compiler optimizations for improving communication-computation overlap
Several existing compiler transformations can help improve communication-computation overlap in MPI applications. However, traditional compilers treat calls to the MPI library as ...
Anthony Danalis, Lori L. Pollock, D. Martin Swany,...
ICALP
2004
Springer
14 years 2 months ago
A General Technique for Managing Strings in Comparison-Driven Data Structures
Abstract. This paper presents a general technique for optimally transforming any dynamic data structure D that operates on atomic and indivisible keys by constant-time comparisons,...
Gianni Franceschini, Roberto Grossi
SIGSOFT
1996
ACM
14 years 1 months ago
Tool Support for Planning the Restructuring of Data Abstractions in Large Systems
Abstractions in Large Systems William G. Griswold, Member, IEEE, Morison I. Chen, Robert W. Bowdidge, Jenny L. Cabaniss, Van B. Nguyen, and J. David Morgenthaler Restructuring soft...
William G. Griswold, Morison I. Chen, Robert W. Bo...