Filters








10 Hits in 3.9 sec

A Migratable User-Level Process Package for PVM

Ravi B. Konuru, Steve W. Otto, Jonathan Walpole
1997 Journal of Parallel and Distributed Computing  
While this approach simplifies the development and portability of such systems, the need to invoke the OS for operations such as local communication and scheduling leads to significant overhead.  ...  Finally, we discuss aspects of the ULP package that affect its portability and its support for heterogeneity, application transparency, and application debugging.  ...  Acknowledgments We thank the anonymous reviewers for their constructive comments on the paper.  ... 
doi:10.1006/jpdc.1996.1270 fatcat:6af23v5vkvf2nhvtb2fvjoqdlq

Trap-driven memory simulation with Tapeworm II

Richard Uhlig, David Nagle, Trevor Mudge, Stuart Sechrest
1997 ACM Transactions on Modeling and Computer Simulation  
Trap-driven simulation is a new approach for analyzing the performance of memory-system components such as caches and translation-lookaside buffers (TLBs).  ...  the type of simulations conducted, or about the nature of its drawbacks with respect to portability and flexibility.  ...  ACKNOWLEDGMENTS We thank Joel Emer and Bill Grundmann for essential information on the DECstation 5000/200 and its memory-controller ASIC.  ... 
doi:10.1145/244804.244805 fatcat:nnhnqcro2rdx7a33bepdyr6q3q

The Bloom Software Visualziation System [chapter]

Steven P. Reiss, Manos Renieris
2003 Software Visualization  
BLOOM addresses software understanding by providing a complete system that combines facilities for collecting and analyzing program data, a visual language for defining what should be visualized and how  ...  The first part of the system, Data Collection, collects data from both static analysis of the source and through trace data collection.  ...  Finally, we wanted to do this in a portable way without any changes to the user's program. The architecture for collecting grace data is shown in Figure 3 .  ... 
doi:10.1007/978-1-4615-0457-3_11 fatcat:2rpz52r54bgkzej6fnz7eyfjn4

Who Should Read This Book [chapter]

2016 Securing the Outdoor Construction Site  
This organization is very typical for Unix databases -so much so that it is often possible to  ...  Programs that must be portable across multiple operating systems may also be good candidates for C.  ...  (In software systems of all kinds, bugs collect at interfaces.)  ... 
doi:10.1016/b978-0-12-802383-9.00019-8 fatcat:5cxlhe2k4fbjzfwouwq6qa7iqe

The raven kernel: a microkernel for shared memory multiprocessors

Duncan S. Ritchie
1993
The Raven kernel is a small, lightweight operating system for shared memory multiprocessors. Raven is characterized by its movement of several traditional kernel abstractions into user space.  ...  This movement of typical kernel-level abstractions into user space can drastically reduce the overall number of user/kernel interactions for fine-grained parallel applications.  ...  This could leave several page tables consumed for apparently no purpose. Curing this problem would require some form of garbage collection in the unmap routines.  ... 
doi:10.14288/1.0051302 fatcat:hghp3dsnzvcathpcv4qubclrhe

Fault-tolerant dynamic parallel schedules

Sebastian Gerlach
2006
Laboratoire de systèmes périphériques SECTION D'INFORmATIQUE i Acknowledgements First and foremost, I would like to thank my research director, Roger Hersch, for providing me the opportunity to work in  ...  Of course, I wouldn't be here if not for my family. I am therefore very grateful to my parents, Silke and Dieter Gerlach, for their unyielding support.  ...  ] is a multiprocessor system.  ... 
doi:10.5075/epfl-thesis-3471 fatcat:q2mcwfl4rra7dgpgl5llurdxrm

Who should Read this Book? [chapter]

Child Protection  
This organization is very typical for Unix databases -so much so that it is often possible to  ...  Programs that must be portable across multiple operating systems may also be good candidates for C.  ...  (In software systems of all kinds, bugs collect at interfaces.)  ... 
doi:10.4135/9781446212677.n4 fatcat:2fda5et7nfd45ms5nihte4wyea

Quality of Experience: From Assessment to Application (Dagstuhl Seminar 15022) Understanding Complexity in Multiobjective Optimization (Dagstuhl Seminar 15031) Model-driven Algorithms and Architectures for Self-Aware Computing Systems (Dagstuhl Seminar 15041) Artificial and Computational Intelligence in Games: Integration (Dagstuhl Seminar 15051)

Michael Philippsen, Pascal Felber, Michael Scott, J Eliot, Katrien De Moor, Markus Fiedler, Peter Reichl, Martín Varela, Salvatore Greco, Kathrin Klamroth, Joshua Knowles, Günter Rudolph (+13 others)
2015 unpublished
The example problems mentioned in this report may serve as a first benchmark for such approaches.  ...  This includes generalizations to interwoven systems with more than two subproblems, an in-depth analysis of the similarities and the differences between different notions of optimality and between the  ...  On verifying concurrent garbage collection for x86-TSO Notes (collected by members of the audience) Proved essentially that garbage collector on multi-/many-core architecture doesn't collect non-garbage  ... 
fatcat:ckaercgotnenhidbwsz7zufttq

Electronic Markets and Auctions (Dagstuhl Seminar 13461) Computational Models of Language Meaning in Context (Dagstuhl Seminar 13462) Synchronous Programming (Dagstuhl Seminar 13471) Global Measurement Framework (Dagstuhl Seminar 13472) Unleashing Operational Process Mining (Dagstuhl Seminar 13481) Forensic Computing (Dagstuhl Seminar 13482)

Saul Greenberg, Kasper Hornbaek, Aaron Quigley, Harald Reiterer, Roman, Yishay Mansour, Benny Moldovanu, Noam Nisan, Berthold, Hans Kamp, Alessandro Lenci, James (+14 others)
2013 unpublished
Alternately synthesize data by using a simulation that can be done more cheaply than collecting real data (e. g., replace cars with garbage cans and crash garbage cans together in the tunnel).  ...  techniques to yield an efficient implementation on a multiprocessor system-on-chip.  ...  How can digital evidence be collected, i. e., what are the requirements for evidence collection procedures? What types of digital evidence are law enforcement agencies allowed to collect?  ... 
fatcat:fl5xhx4dpbeklg6o6xhmuvuety

MULTI-DOMAIN INFORMATION MODEL

Larissa Zainutdinova, Russia, Aleksey Voloshin, Laura Ciocoiu, Romania, Alexander Eremeev, Levon Aslanian, Armenia, Alexander Kleshchev, Russia, Luis De Mingo, Spain (+46 others)
2004 International Journal International Journal "Information Theories & Applications   unpublished
IJ ITA is official publisher of the scientific papers of the members of the Association of Developers and Users of Intellectualized Systems (ADUIS).  ...  IJ ITA rules for preparing the manuscripts are compulsory. The rules for the papers for IJ ITA as well as the subscription fees are given on www.foibg.com/ijita.  ...  So they can solve arising tasks both autonomously and collectively. For collective solution of tasks the agents may cooperate and self-organize in working groups "by interests".  ... 
fatcat:gguwllmalng67hpmhdggatolru