Sciweavers

CISIS
2009
IEEE
14 years 6 months ago
Application of a Critical Chain Project Management Based Framework on Max-Plus Linear Systems
Abstract. We focus on discrete event systems with a structure of parallel processing, synchronization, and noconcurrency. We use max-plus algebra, which is an effective approach fo...
Hirotaka Takahashi, Hiroyuki Goto, Munenori Kasaha...
CISIS
2009
IEEE
14 years 6 months ago
SAMOA - A Semi-Automated Ontology Alignment Method for Systems Integration in Safety-Critical Environments
The integration of heterogeneous data sources with even heterogeneous semantic meanings poses a challenge for data and system integrators. Ontology Alignment (OA) tries to identif...
Thomas Moser, Kathrin Schimper, Richard Mordinyi, ...
CISIS
2009
IEEE
14 years 6 months ago
A Security Layer for JXTA Core Protocols
— JXTA defines a set of six core protocols specifically suited for ad hoc, pervasive, multi-hop, peer-to-peer (P2P) computing. These protocols allow peers to cooperate and form...
Joan Arnedo-Moreno, Jordi Herrera-Joancomart&iacut...
CGO
2009
IEEE
14 years 6 months ago
Wave Propagation and Deep Propagation for Pointer Analysis
Fernando Magno Quintao Pereira, Daniel Berlin
CGO
2009
IEEE
14 years 6 months ago
Computer Generation of General Size Linear Transform Libraries
The development of high-performance libraries has become extraordinarily difficult due to multiple processor cores, vector instruction sets, and deep memory hierarchies. Often, t...
Yevgen Voronenko, Frédéric de Mesmay...
CGO
2009
IEEE
14 years 6 months ago
Techniques for Region-Based Register Allocation
—Register allocation is an important component of every compiler and numerous studies have investigated ways to improve allocation quality or reduce allocation time. However, tec...
Ivan D. Baev
CGO
2009
IEEE
14 years 6 months ago
Reducing Memory Ordering Overheads in Software Transactional Memory
—Most research into high-performance software transactional memory (STM) assumes that transactions will run on a processor with a relatively strict memory model, such as Total St...
Michael F. Spear, Maged M. Michael, Michael L. Sco...
CGO
2009
IEEE
14 years 6 months ago
Automatic Feature Generation for Machine Learning Based Optimizing Compilation
Recent work has shown that machine learning can automate and in some cases outperform hand crafted compiler optimizations. Central to such an approach is that machine learning tec...
Hugh Leather, Edwin V. Bonilla, Michael O'Boyle
CGO
2009
IEEE
14 years 6 months ago
ESoftCheck: Removal of Non-vital Checks for Fault Tolerance
—As semiconductor technology scales into the deep submicron regime the occurrence of transient or soft errors will increase. This will require new approaches to error detection. ...
Jing Yu, María Jesús Garzarán...
CGO
2009
IEEE
14 years 6 months ago
Software Pipelined Execution of Stream Programs on GPUs
—The StreamIt programming model has been proposed to exploit parallelism in streaming applications on general purpose multicore architectures. This model allows programmers to sp...
Abhishek Udupa, R. Govindarajan, Matthew J. Thazhu...