Sciweavers

12334 search results - page 204 / 2467
» The Use of C
Sort
View
IPPS
1999
IEEE
15 years 9 months ago
Application Performance of a Linux Cluster Using Converse
Abstract. Clusters of PCs are an attractive platform for parallel applications because of their cost effectiveness. We have implemented an interoperable runtime system called Conve...
Laxmikant V. Kalé, Robert Brunner, James C....
WSC
2001
15 years 6 months ago
Analyzing the supply chain for a large logistics operation using simulation
This paper presents a case study of using simulation for analyzing the impact of proposed changes in the supply chain processes for a large logistics operation. The major changes ...
Sanjay Jain, Eric C. Ervin, Andrew P. Lathrop, Rus...
ACL
1998
15 years 6 months ago
Text Segmentation Using Reiteration and Collocation
A method is presented for segmenting text into subtopic areas. The proportion of related pairwise words is calculated between adjacent windows of text to determine their lexical s...
Amanda C. Jobbins, Lindsay J. Evett
PDPTA
1996
15 years 6 months ago
Exploiting Task-Level Parallelism Using pTask
This paper presents pTask-- a system that allows users to automatically exploit dynamic task-level parallelism in sequential array-based C programs. The system employs compiler an...
Tarek S. Abdelrahman, Sum Huynh
SODA
2003
ACM
114views Algorithms» more  SODA 2003»
15 years 6 months ago
Lower bounds for collusion-secure fingerprinting
Collusion-secure fingerprinting codes are an important primitive used by many digital watermarking schemes [1, 10, 9]. Boneh and Shaw [3] define a model for these types of codes...
Chris Peikert, Abhi Shelat, Adam Smith