- Full text PDF available (43)
- This year (1)
- Last 5 years (1)
- Last 10 years (13)
Journals and Conferences
Many metrics are used for measuring the performance of a parallel algorithm running on a parallel processor. This article introduces a new metric that has some advantages over the others. Its use is illustrated with data from the Linpack benchmark report and the winners of the Gordon Bell Award.
© From ABAC to ZBAC: The Evolution of Access Control Models Alan H. Karp, Harry Haury, Michael H. Davis
Explicit Runge-Kutta methods (RKMs) are among the most popular classes of formulas for the approximate numerical integration of nonstiff, initial value problems. However, high-order Runge-Kutta methods require more function evaluations per integration step than, for example, Adams methods used in PECE mode, and so, with RKMs, it is expecially important to… (More)
The state of the art of parallel programming and what a sorry state that art is in. In the last few years we have seen an explosion in the interest in and availability of parallel processors' and a corresponding expansion in applications programming activity. Clearly, applications programmers need tools to express the parallelism, either in the form of… (More)
We present division and square root algorithm for calculations with more bits than are handled by the floating-point hardware. These algorithms avoid the need to multiply two high-precision numbers, speeding up the last iteration by as much as a factor of 10. We also show how to produce the floating-point number closest to the exact result with relatively… (More)
Bit reversal, hierarchical memory, Fast Fourier Transform Many versions of the Fast Fourier Transform require a reordering of either the input or the output data that corresponds to reversing the order of the bits in the array index. There has been a surprisingly large number of papers on this subject in the recent literature. This paper collects 30 methods… (More)
RDF(Resource Description Framework), graph, digest, signature, cryptography, security Efficient algorithms are needed for computing the digest of a Resource Description Framework (RDF) graph. These may be used to assign unique content-dependent identifiers and for use in digital signatures, allowing a recipient to verify that RDF was generated by a… (More)
It limits the damage a virus can do by using the operating system's own security mechanisms to enforce the Principle of Least Authority on individual applications.
Several attempts at using the services oriented architecture have failed to achieve their goals of scalability, security, and manageability. These systems, which base access decisions on the identity of the requester, have been found to be inflexible, don't scale well, and are difficult to use and to upgrade. This paper shows that identity-based access… (More)
The most time consuming part of an N-body simulation is computing the components of the accelerations of the particles. On most machines the slowest part of computing the acceleration is in evaluating r 3=2 which is especially true on machines that do the square root in software. This note shows how to cut the time for this part of the calculation by a… (More)