Sciweavers

1821 search results - page 68 / 365
» Security-Aware Program Transformations
Sort
View
131
Voted
SC
2005
ACM
15 years 7 months ago
Transformations to Parallel Codes for Communication-Computation Overlap
This paper presents program transformations directed toward improving communication-computation overlap in parallel programs that use MPI’s collective operations. Our transforma...
Anthony Danalis, Ki-Yong Kim, Lori L. Pollock, D. ...
99
Voted
OPODIS
2003
15 years 3 months ago
Transformations for Write-All-with-Collision Model
Dependable properties such as self-stabilization are crucial requirements in sensor networks. One way to achieve these properties is to utilize the vast literature on distributed ...
Sandeep S. Kulkarni, Umamaheswaran Arumugam
ICALP
2010
Springer
15 years 7 months ago
Compositionality in Graph Transformation
Graph transformation works under a whole-world assumption. In modelling realistic systems, this typically makes for large graphs and sometimes also large, hard to understand rules....
Arend Rensink
102
Voted
APLAS
2008
ACM
15 years 4 months ago
Certified Reasoning in Memory Hierarchies
Abstract. Parallel programming is rapidly gaining importance as a vector to develop high performance applications that exploit the improved capabilities of modern computer architec...
Gilles Barthe, César Kunz, Jorge Luis Sacch...
222
Voted
POPL
2002
ACM
16 years 2 months ago
Composing dataflow analyses and transformations
Dataflow analyses can have mutually beneficial interactions. Previous efforts to exploit these interactions have either (1) iteratively performed each individual analysis until no...
Sorin Lerner, David Grove, Craig Chambers