#### Filter Results:

- Full text PDF available (43)

#### Publication Year

1984

2017

- This year (1)
- Last 5 years (1)
- Last 10 years (13)

#### Publication Type

#### Co-author

#### Journals and Conferences

Learn More

- Alan H. Karp, Horace P. Flatt
- Commun. ACM
- 1990

Many metrics are used for measuring the performance of a parallel algorithm running on a parallel processor. This article introduces a new metric that has some advantages over the others. Its use is illustrated with data from the Linpack benchmark report and the winners of the Gordon Bell Award.

- Alan H. Karp, Harry Haury, Michael H. Davis, Michael H.Davis
- 2009

Â© From ABAC to ZBAC: The Evolution of Access Control Models Alan H. Karp, Harry Haury, Michael H. Davis

- Jeff R. Cash, Alan H. Karp
- ACM Trans. Math. Softw.
- 1990

Explicit Runge-Kutta methods (RKMs) are among the most popular classes of formulas for the approximate numerical integration of nonstiff, initial value problems. However, high-order Runge-Kutta methods require more function evaluations per integration step than, for example, Adams methods used in PECE mode, and so, with RKMs, it is expecially important toâ€¦ (More)

- Alan H. Karp
- Computer
- 1987

The state of the art of parallel programming and what a sorry state that art is in. In the last few years we have seen an explosion in the interest in and availability of parallel processors' and a corresponding expansion in applications programming activity. Clearly, applications programmers need tools to express the parallelism, either in the form ofâ€¦ (More)

- Alan H. Karp, Peter W. Markstein
- ACM Trans. Math. Softw.
- 1997

We present division and square root algorithm for calculations with more bits than are handled by the floating-point hardware. These algorithms avoid the need to multiply two high-precision numbers, speeding up the last iteration by as much as a factor of 10. We also show how to produce the floating-point number closest to the exact result with relativelyâ€¦ (More)

- Alan H. Karp
- SIAM Review
- 1996

Bit reversal, hierarchical memory, Fast Fourier Transform Many versions of the Fast Fourier Transform require a reordering of either the input or the output data that corresponds to reversing the order of the bits in the array index. There has been a surprisingly large number of papers on this subject in the recent literature. This paper collects 30 methodsâ€¦ (More)

- Craig Sayers, Alan H. Karp
- 2004

RDF(Resource Description Framework), graph, digest, signature, cryptography, security Efficient algorithms are needed for computing the digest of a Resource Description Framework (RDF) graph. These may be used to assign unique content-dependent identifiers and for use in digital signatures, allowing a recipient to verify that RDF was generated by aâ€¦ (More)

- Marc Stiegler, Alan H. Karp, Ka-Ping Yee, Tyler Close, Mark S. Miller
- Commun. ACM
- 2006

It limits the damage a virus can do by using the operating system's own security mechanisms to enforce the Principle of Least Authority on individual applications.

- Alan H. Karp
- Fourth International Conference on Creatingâ€¦
- 2006

Several attempts at using the services oriented architecture have failed to achieve their goals of scalability, security, and manageability. These systems, which base access decisions on the identity of the requester, have been found to be inflexible, don't scale well, and are difficult to use and to upgrade. This paper shows that identity-based accessâ€¦ (More)

- Alan H. Karp
- Scientific Programming
- 1992

The most time consuming part of an N-body simulation is computing the components of the accelerations of the particles. On most machines the slowest part of computing the acceleration is in evaluating r 3=2 which is especially true on machines that do the square root in software. This note shows how to cut the time for this part of the calculation by aâ€¦ (More)