Sciweavers

SC
2009
ACM
14 years 3 months ago
Dynamic task scheduling for linear algebra algorithms on distributed-memory multicore systems
This paper presents a dynamic task scheduling approach to executing dense linear algebra algorithms on multicore systems (either shared-memory or distributed-memory). We use a tas...
Fengguang Song, Asim YarKhan, Jack Dongarra
SC
2009
ACM
14 years 3 months ago
Allocator implementations for network-on-chip routers
The present contribution explores the design space for virtual channel (VC) and switch allocators in network-on-chip (NoC) routers. Based on detailed RTL-level implementations, we...
Daniel U. Becker, William J. Dally
SC
2009
ACM
14 years 3 months ago
PLFS: a checkpoint filesystem for parallel applications
John Bent, Garth A. Gibson, Gary Grider, Ben McCle...
SC
2009
ACM
14 years 3 months ago
GridBot: execution of bags of tasks in multiple grids
Mark Silberstein, Artyom Sharov, Dan Geiger, Assaf...
SC
2009
ACM
14 years 3 months ago
Increasing memory miss tolerance for SIMD cores
Manycore processors with wide SIMD cores are becoming a popular choice for the next generation of throughput oriented architectures. We introduce a hardware technique called “di...
David Tarjan, Jiayuan Meng, Kevin Skadron
SC
2009
ACM
14 years 3 months ago
Future scaling of processor-memory interfaces
Continuous evolution in process technology brings energyefficiency and reliability challenges, which are harder for memory system designs since chip multiprocessors demand high ba...
Jung Ho Ahn, Norman P. Jouppi, Christos Kozyrakis,...
SAC
2009
ACM
14 years 3 months ago
Keeping diversity when exploring dynamic environments
This paper presents a new exploration mechanism based on a heterogeneous multi-agent system that combines attractive and repulsive agents. We provide experimental results about th...
Jose Luis Fernandez-Marquez, Josep Lluís Ar...
SAC
2009
ACM
14 years 3 months ago
Open source vs. closed source software: towards measuring security
The increasing availability and deployment of open source software in personal and commercial environments makes open source software highly appealing for hackers, and others who ...
Guido Schryen, Rouven Kadura
SAC
2009
ACM
14 years 3 months ago
Remote software protection by orthogonal client replacement
In a typical client-server scenario, a trusted server provides valuable services to a client, which runs remotely on an untrusted platform. Of the many security vulnerabilities th...
Mariano Ceccato, Paolo Tonella, Mila Dalla Preda, ...