Combining bmc and fuzzing techniques for finding software vulnerabilities in concurrent programs
Finding software vulnerabilities in concurrent programs is a challenging task due to the size
of the state-space exploration, as the number of interleavings grows exponentially with the …
of the state-space exploration, as the number of interleavings grows exponentially with the …
[图书][B] Algorithm Engineering
M Müller-Hannemann, S Schirra - 2001 - Springer
The systematic development of efficient algorithms has become a key technology for all
kinds of ambitious and innovative computer applications. With major parts of algorithmic …
kinds of ambitious and innovative computer applications. With major parts of algorithmic …
Information technology adoption by small businesses in minority and ethnic communities
S Qureshi, AS York - Proceedings of the 41st Annual Hawaii …, 2008 - ieeexplore.ieee.org
Information systems adoption by small businesses often is viewed as a basic building block
of economic development. Yet, the components that impact business success and thus …
of economic development. Yet, the components that impact business success and thus …
SWARM: A parallel programming framework for multicore processors
Due to fundamental physical limitations and power constraints, we are witnessing a radical
change in commodity microprocessor architectures to multicore designs. Continued …
change in commodity microprocessor architectures to multicore designs. Continued …
[图书][B] Shared-memory parallelism can be simple, fast, and scalable
J Shun - 2017 - books.google.com
Parallelism is the key to achieving high performance in computing. However, writing efficient
and scalable parallel programs is notoriously difficult, and often requires significant …
and scalable parallel programs is notoriously difficult, and often requires significant …
Receiver-initiated message passing over RDMA networks
S Pakin - 2008 IEEE International Symposium on Parallel and …, 2008 - ieeexplore.ieee.org
Providing point-to-point messaging-passing semantics atop Put/Get hardware traditionally
involves implementing a protocol comprising three network latencies. In this paper, we …
involves implementing a protocol comprising three network latencies. In this paper, we …
Parallel wavelet tree construction
J Shun - 2015 Data compression conference, 2015 - ieeexplore.ieee.org
We present parallel algorithms for wavelet tree construction with polylogarithmic depth,
improving upon the linear depth of the recent parallel algorithms by Fuentes-Sepulveda et …
improving upon the linear depth of the recent parallel algorithms by Fuentes-Sepulveda et …
Towards an intelligent environment for programming multi-core computing systems
In this position paper we argue that an intelligent program development environment that
proactively supports the user helps a mainstream programmer to overcome the difficulties of …
proactively supports the user helps a mainstream programmer to overcome the difficulties of …
Navigating an evolutionary fast path to exascale
RF Barrett, SD Hammond, CT Vaughan… - 2012 SC Companion …, 2012 - ieeexplore.ieee.org
The computing community is in the midst of a disruptive architectural change. The advent of
manycore and heterogeneous computing nodes forces us to reconsider every aspect of the …
manycore and heterogeneous computing nodes forces us to reconsider every aspect of the …
多核软件的几个关键问题及其研究进展
杨际祥, 谭国真, 王荣生 - 电子学报, 2010 - ejournal.org.cn
提高应用程序开发产能同时获得并行性能收益是多核大众化并行计算研究的核心目标.
采用应用驱动和自顶向下的研究思想着重综述了影响该目标的三个关键问题. 首先 …
采用应用驱动和自顶向下的研究思想着重综述了影响该目标的三个关键问题. 首先 …