A variable order Runge-Kutta method for initial value problems with rapidly varying right-hand sides
A family of explicit Runge-Kutta formulas that contains imbedded formulas of all orders 1 through 4 is derived, which is very efficient for problems with smooth solution as well as problems having rapidly varying solutions.
Measuring parallel processor performance
A new metric that has some advantages over the others is introduced that is illustrated with data from the Linpack benchmark report and the winners of the Gordon Bell Award.
From ABAC to ZBAC : The Evolution of Access Control Models
From ABAC to ZBAC: The Evolution of Access Control Models, Alan H. Karp, Harry Haury, Michael H. Davis, and David Davis show the evolution of access control models from single-use to multi-use devices.
Programming for Parallelism
- A. Karp
- Computer ScienceComputer
- 1 May 1987
In the last few years we have seen an explosion in the interest in and availability of parallel processors and a corresponding expansion in applications programming activity. Clearly, applications…
High-precision division and square root
These algorithms avoid the need to multiply two high-precision numbers, speeding up the last iteration by as much as a factor of 10, and show how to produce the floating-point number closest to the exact result with relatively few additional operations.
Bit Reversal on Uniprocessors
- A. Karp
- Computer ScienceSIAM Review
- 1 March 1996
This paper collects 30 methods for bit reversing an array, recoded into a uniform style in Fortran and its performance measured on several different machines, each with a different memory system.
Computing the digest of an RDF graph
Efficient algorithms are needed for computing the digest of a Resource Description Framework (RDF) graph, used to assign unique content-dependent identifiers and for use in digital signatures, allowing a recipient to verify that RDF was generated by a particular individual and/or has not been altered in transit.
Polaris: virus-safe computing for Windows XP
It limits the damage a virus can do by using the operating system's own security mechanisms to enforce the Principle of Least Authority on individual applications.
Implementing Linear Algebra Algorithms for Dense Matrices on a Vector Pipeline Machine
This paper examines common implementations of linear algebra algorithms, such as matrix-vector multiplication, matrix-matrix multiplication and the solution of linear equations for efficiency on a computer architecture which uses vector processing and has pipelined instruction execution.
A comparison of 12 parallel FORTRAN dialects
A simple program that approximates pi by numerical quadrature is rewritten to run on nine commercially available processors to illustrate the compilations that arise in parallel programming in…