


default search action
IEEE Transactions on Computers, Volume 59
Volume 59, Number 1, January 2010
- Peng Gu, Jun Wang

, Yifeng Zhu, Hong Jiang, Pengju Shang:
A Novel Weighted-Graph-Based Grouping Algorithm for Metadata Prefetching. 1-15 - Antonio Flores, Juan L. Aragón

, Manuel E. Acacio
:
Heterogeneous Interconnects for Energy-Efficient Message Management in CMPs. 16-28 - Souradip Sarkar, Gaurav Ramesh Kulkarni, Partha Pratim Pande, Ananth Kalyanaraman:

Network-on-Chip Hardware Accelerators for Biological Sequence Alignment. 29-41 - Xiao Qin

, Hong Jiang, Adam Manzanares, Xiaojun Ruan, Shu Yin:
Communication-Aware Load Balancing for Parallel Applications on Clusters. 42-52 - Yuan-Hao Chang

, Jen-Wei Hsieh, Tei-Wei Kuo
:
Improving Flash Wear-Leveling by Proactively Moving Static Data. 53-65 - Giuliano Casale

, Ningfang Mi, Evgenia Smirni:
Model-Driven System Capacity Planning under Workload Burstiness. 66-80 - Billy Bob Brumley

, Kimmo U. Järvinen:
Conversion Algorithms and Implementations for Koblitz Curve Cryptography. 81-92 - Shyue-Ming Tang, Jinn-Shyong Yang, Yue-Li Wang, Jou-Ming Chang

:
Independent Spanning Trees on Multidimensional Torus Networks. 93-102 - Yinglong Xia, Viktor K. Prasanna:

Scalable Node-Level Computation Kernels for Parallel Exact Inference. 103-115 - Fei He, Xiaoyu Song, William N. N. Hung, Ming Gu, Jiaguang Sun:

Integrating Evolutionary Computation with Abstraction Refinement for Model Checking. 116-126 - Jong Sung Lee, Kevin Skadron

, Sung Woo Chung:
Predictive Temperature-Aware DVFS. 127-133 - Gang Chen, Feng Liu:

Proofs of Correctness and Properties of Integer Adder Circuits. 134-136 - Víctor Suñé, Juan A. Carrasco, Hédi Nabli

, Bruno Sericola:
Comment on "Performability Analysis: A New Algorithm". 137-138
Volume 59, Number 2, February 2010
- Fabrizio Lombardi:

State of the Journal. 145-149 - Irith Pomeranz, Sudhakar M. Reddy:

Equivalence, Dominance, and Similarity Relations between Fault Pairs and a Fault Pair Collapsing Process for Fault Diagnosis. 150-158 - Ahmed Yassin Al-Dubai

, Mohamed Ould-Khaoua, Lewis M. Mackenzie:
Trade-Offs between Latency, Complexity, and Load Balancing with Multicast Algorithms. 159-173 - Chiara Francalanci, Paolo Giacomazzi:

A High-Performance Deadlock-Free Multicast Routing Algorithm for K-Ary N-Cubes. 174-187 - Orlando Moreira, Twan Basten

, Marc Geilen
, Sander Stuijk
:
Buffer Sizing for Rate-Optimal Single-Rate Data-Flow Scheduling Revisited. 188-201 - Anne Benoit

, Loris Marchal
, Jean-Francois Pineau, Yves Robert
, Frédéric Vivien
:
Scheduling Concurrent Bag-of-Tasks Applications on Heterogeneous Platforms. 202-217 - MyungKeun Yoon

, Shigang Chen, Zhan Zhang:
Minimizing the Maximum Firewall Rule Set in a Network with Multiple Firewalls. 218-230 - Shamik Sengupta, Mainak Chatterjee, Kevin A. Kwiat:

A Game Theoretic Framework for Power Control in Wireless Sensor Networks. 231-242 - Habib M. Ammari, Sajal K. Das

:
A Study of k-Coverage and Measures of Connectivity in 3D Wireless Sensor Networks. 243-257 - Kemal Akkaya, Fatih Senel, Aravind Thimmapuram, Suleyman Uludag

:
Distributed Recovery from Network Partitioning in Movable Sensor/Actor Networks via Controlled Mobility. 258-271 - Ruhi Sarikaya, Alper Buyuktosunoglu:

A Unified Prediction Method for Predicting Program Behavior. 272-282 - Chin-Yu Huang, Chu-Ti Lin:

Analysis of Software Reliability Modeling Considering Testing Compression Factor and Failure-to-Fault Relationship. 283-288
Volume 59, Number 3, March 2010
- Alberto Bosio, Patrick Girard, Serge Pravossoudovitch, Arnaud Virazel:

A Comprehensive Framework for Logic Diagnosis of Arbitrary Defects. 289-300 - Stelios Neophytou

, Maria K. Michael:
Test Set Generation with a Large Number of Unspecified Bits Using Static and Dynamic Techniques. 301-316 - Pawel Garbacki, Dick H. J. Epema, Maarten van Steen

:
The Design and Evaluation of a Self-Organizing Superpeer Network. 317-331 - Yuho Jin, Eun Jung Kim, Ki Hwan Yum:

Design and Analysis of On-Chip Networks for Large-Scale Cache Systems. 332-344 - Guangyan Zhang, Weimin Zheng, Jiwu Shu:

ALV: A New Data Redistribution Approach to RAID-5 Scaling. 345-357 - Ulrich Finkler:

An Analytic Framework for Detailed Resource Profiling in Large and Parallel Programs and Its Application for Memory Use. 358-370 - Josep Carmona

, Jordi Cortadella
, Michael Kishinevsky:
New Region-Based Algorithms for Deriving Bounded Petri Nets. 371-384 - Manoj Gupta, Fermín Sánchez

, Josep Llosa
:
CSMT: Simultaneous Multithreading for Clustered VLIW Processors. 385-399 - Rodolfo Pellizzoni, Marco Caccamo:

Impact of Peripheral-Processor Interference on WCET Analysis of Real-Time Embedded Systems. 400-415 - Tommaso Cucinotta

, Luigi Palopoli:
QoS Control for Pipelines of Tasks Using Multiple Resources. 416-430
Volume 59, Number 4, April 2010
- Ben Cope, Peter Y. K. Cheung, Wayne Luk, Lee W. Howes

:
Performance Comparison of Graphics Processors to Reconfigurable Logic: A Case Study. 433-448 - Amirhossein Alimohammad, Saeed Fouladi Fard, Bruce F. Cockburn:

A Unified Architecture for the Accurate and High-Throughput Implementation of Six Key Elementary Functions. 449-456 - Jie-Hong Roland Jiang, Chih-Chun Lee, Alan Mishchenko, Chung-Yang Huang:

To SAT or Not to SAT: Scalable Exploration of Functional Dependency. 457-467 - Yusuf Hasan, Wei-Mei Chen, J. Morris Chang, Bashar Gharaibeh:

Upper Bounds for Dynamic Memory Allocation. 468-477 - Clemens Moser, Lothar Thiele, Davide Brunelli

, Luca Benini
:
Adaptive Power Management for Environmentally Powered Systems. 478-491 - Yeim-Kuan Chang, Yung-Chieh Lin, Cheng-Chien Su:

Dynamic Multiway Segment Tree for IP Lookups and the Fast Pipelined Search Engine. 492-506 - Yang Xiao

, Hui Chen
, Kui Wu, Bo Sun, Ying Zhang, Xinyu Sun, Chong Liu:
Coverage and Detection of a Randomized Scheduling Algorithm in Wireless Sensor Networks. 507-521 - Terence K. Rodrigues, Earl E. Swartzlander Jr.:

Adaptive CORDIC: Using Parallel Angle Recoding to Accelerate Rotations. 522-531 - Wu Jigang, Thambipillai Srikanthan

, Guang Chen:
Algorithmic Aspects of Hardware/Software Partitioning: 1D Search Algorithms. 532-544 - Ole-Christoffer Granmo

, B. John Oommen
:
Solving Stochastic Nonlinear Resource Allocation Problems Using a Hierarchy of Twofold Resource Allocation Automata. 545-560 - Hao Zheng, Haiqiong Yao, Tomohiro Yoneda:

Modular Model Checking of Large Asynchronous Designs with Efficient Abstraction Refinement. 561-573 - Ondrej Lhoták, Stephen Curial, José Nelson Amaral:

An Optimal Encoding to Represent a Single Set in an ROBDD. 574-575
Volume 59, Number 5, May 2010
- Cristiana Bolchini

, Donatella Sciuto
:
Guest Editors' Introduction: Special Section on System-Level Design of Reliable Architectures. 577-578 - Osman Hasan

, Sofiène Tahar, Naeem Abbasi:
Formal Reliability Analysis Using Theorem Proving. 579-592 - Bin Li, Lide Duan, Lu Peng:

Efficient Microarchitectural Vulnerabilities Prediction Using Boosted Regression Trees and Patient Rule Inductions. 593-607 - Mehran Mozaffari Kermani

, Arash Reyhani-Masoleh:
Concurrent Structure-Independent Fault Detection Schemes for the Advanced Encryption Standard. 608-622 - Javier Carretero, Xavier Vera, Pedro Chaparro, Jaume Abella

:
Microarchitectural Online Testing for Failure Detection in Memory Order Buffers. 623-637 - Hyunjin Lee, Sangyeun Cho, Bruce R. Childers:

PERFECTORY: A Fault-Tolerant Directory Memory Architecture. 638-650 - Omer Khan, Sandip Kundu:

Thread Relocation: A Runtime Architecture for Tolerating Hard Errors in Chip Multiprocessors. 651-665 - Kyungtae Kang, Lui Sha:

An Interleaving Structure for Guaranteed QoS in Real-Time Broadcasting Systems. 666-678 - Álvaro Vázquez

, Elisardo Antelo
, Paolo Montuschi
:
Improved Design of High-Performance Parallel Decimal Multipliers. 679-693 - Ghassem Jaberipur, Behrooz Parhami, Saeid Gorgin

:
Redundant-Digit Floating-Point Addition Scheme Based on a Stored Rounding Value. 694-706 - M. Tamer Refaei, Luiz A. DaSilva, Mohamed Eltoweissy, Tamer Nadeem

:
Adaptation of Reputation Management Systems to Dynamic Network Conditions in Ad Hoc Networks. 707-719
Volume 59, Number 6, June 2010
- Chen Wang

, Bing Bing Zhou
, Albert Y. Zomaya
:
EvolvingSpace: A Data Centric Framework for Integrating Bioinformatics Applications. 721-734 - Manish Kumar Shukla, A. Yavuz Oruç:

Multicasting in Quantum Switching Networks. 735-747 - Itamar Cohen

, Ori Rottenstreich, Isaac Keslassy
:
Statistical Approach to Networks-on-Chip. 748-761 - George Lentaris, Dionysios I. Reisis:

A Graphics Parallel Memory Organization Exploiting Request Correlations. 762-775 - Jianjia Wu, Jyh-Charn Liu, Wei Zhao

:
A General Framework for Parameterized Schedulability Bound Analysis of Real-Time Systems. 776-783 - Hyesook Lim

, Changhoon Yim
, Earl E. Swartzlander Jr.:
Priority Tries for IP Address Lookup. 784-794 - Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki, Akashi Satoh, Adi Shamir:

Comparative Power Analysis of Modular Exponentiation Algorithms. 795-807 - Azzedine Boukerche, Jan Mendonca Correa, Alba Cristina Magalhaes Alves de Melo

, Ricardo P. Jacobi
:
A Hardware Accelerator for the Fast Retrieval of DIALIGN Biological Sequence Alignments in Linear Space. 808-821 - Chia-Hung Lin, Shiao-An Yuan, Shih-Wei Chiu, Ming-Jer Tsai:

ProgressFace: An Algorithm to Improve Routing Efficiency of GPSR-Like Routing Protocols in Wireless Ad Hoc Networks. 822-834 - Juliano B. Lima

, Daniel Panario
, Qiang Wang
:
A Karatsuba-Based Algorithm for Polynomial Multiplication in Chebyshev Form. 835-841 - Lein Harn, Changlu Lin:

Authenticated Group Key Transfer Protocol Based on Secret Sharing. 842-846 - Shufu Mao, Tilman Wolf

:
Hardware Support for Secure Processing in Embedded Systems. 847-854 - Yiqiang Ding, Wei Zhang

:
Loop-Based Instruction Prefetching to Reduce the Worst-Case Execution Time. 855-864
Volume 59, Number 7, July 2010
- Dusit Niyato

, Ekram Hossain:
A Microeconomic Model for Hierarchical Bandwidth Sharing in Dynamic Spectrum Access Networks. 865-877 - Dong Kim, Kwanhu Bang, Seung-Hwan Ha, Sungroh Yoon, Eui-Young Chung:

Architecture Exploration of High-Performance PCs with a Solid-State Disk. 878-890 - Mirko Loghi, Olga Golubeva

, Enrico Macii, Massimo Poncino:
Architectural Leakage Power Minimization of Scratchpad Memories by Application-Driven Subbanking. 891-904 - Yoon Jae Seong, Eyee Hyun Nam, Jinhyuk Yoon, Hongseok Kim, Jin-Yong Choi, Sookwan Lee, Young Hyun Bae, Jaejin Lee, Yookun Cho, Sang Lyul Min:

Hydra: A Block-Mapped Parallel Flash Memory Solid-State Disk Architecture. 905-921 - Alodeep Sanyal, Ashesh Rastogi, Wei Chen, Sandip Kundu:

An Efficient Technique for Leakage Current Estimation in Nanoscaled CMOS Circuits Incorporating Self-Loading Effects. 922-932 - Man-Ki Yoon, Chang-Gun Lee, Junghee Han:

Migrating from Per-Job Analysis to Per-Resource Analysis for Tighter Bounds of End-to-End Response Times. 933-942 - Songqing Chen, Shiping Chen, Xinyuan Wang, Zhao Zhang, Sushil Jajodia

:
An Application-Level Data Transparent Authentication Scheme without Communication Overhead. 943-954 - Animesh Pathak, Viktor K. Prasanna:

Energy-Efficient Task Mapping for Data-Driven Sensor Network Macroprogramming. 955-968 - Hanhua Chen, Jun Yan, Hai Jin, Yunhao Liu, Lionel M. Ni:

TSS: Efficient Term Set Search in Large Peer-to-Peer Textual Collections. 969-980 - Hratch Mangassarian, Andreas G. Veneris, Marco Benedetti:

Robust QBF Encodings for Sequential Circuits with Applications to Verification, Debug, and Test. 981-994 - Ozgur Sinanoglu

, Mehmet Hakan Karaata, Bader F. AlBdaiwi:
An Inherently Stabilizing Algorithm for Node-To-Node Routing over All Shortest Node-Disjoint Paths in Hypercube Networks. 995-999 - Haohuan Fu, Oskar Mencer, Wayne Luk:

FPGA Designs with Optimized Logarithmic Arithmetic. 1000-1006 - Gang Zhou, Harald Michalik:

Comments on "A New Architecture for a Parallel Finite Field Multiplier with Low Complexity Based on Composite Field". 1007-1008
Volume 59, Number 8, August 2010
- Alaaeldin Amin, M. Waleed Shinwari

:
High-Radix Multiplier-Dividers: Theory, Design, and Hardware. 1009-1022 - Adenilso da Silva Simão

, Alexandre Petrenko
:
Checking Completeness of Tests for Finite State Machines. 1023-1032 - Hongzhong Zheng, Zhichun Zhu:

Power and Performance Trade-Offs in Contemporary DRAM System Designs for Multicore Processors. 1033-1046 - Bernhard Egger

, Seungkyun Kim, Choonki Jang, Jaejin Lee, Sang Lyul Min, Heonshik Shin:
Scratchpad Memory Management Techniques for Code in Embedded Systems without an MMU. 1047-1062 - Yang Chang, Andy J. Wellings:

Garbage Collection for Flexible Hard Real-Time Systems. 1063-1075 - Xiaojing Xiang, Xin Wang, Yuanyuan Yang

:
Stateless Multicasting in Mobile Ad Hoc Networks. 1076-1090 - Harold Ishebabi, Christophe Bobda:

Heuristics for Flexible CMP Synthesis. 1091-1104 - Suzana Stojkovic, Dragan Jankovic

, Radomir S. Stankovic:
An Improved Algorithm for the Construction of Decision Diagrams by Rearranging and Partitioning the Input Cube Set. 1105-1119 - Taekyoung Kwon, Jin Hong

:
Secure and Efficient Broadcast Authentication in Wireless Sensor Networks. 1120-1133 - Ron S. Waters, Earl E. Swartzlander Jr.:

A Reduced Complexity Wallace Multiplier Reduction. 1134-1137 - Sudarshan K. Srinivasan:

Automatic Refinement Checking of Pipelines with Out-of-Order Execution. 1138-1144 - Ming-Der Shieh, Wen-Ching Lin:

Word-Based Montgomery Modular Multiplication Algorithm for Low-Latency Scalable Architectures. 1145-1151
Volume 59, Number 9, September 2010
- Guey-Yun Chang:

(t, k)-Diagnosability for Regular Networks. 1153-1157 - Min Yang, Yuanyuan Yang

:
An Efficient Hybrid Peer-to-Peer System for Distributed Data Sharing. 1158-1171 - Paolo Valente

, Fabio Checconi:
High Throughput Disk Scheduling with Fair Bandwidth Distribution. 1172-1186 - Igor V. Zotov

:
Distributed Virtual Bit-Slice Synchronizer: A Scalable Hardware Barrier Mechanism for n-Dimensional Meshes. 1187-1199 - Kyueun Yi, Jean-Luc Gaudiot:

Network Applications on Simultaneous Multithreading Processors. 1200-1209 - Jack Whitham, Neil C. Audsley:

Time-Predictable Out-of-Order Execution for Hard Real-Time Systems. 1210-1223 - Hannes Frey, Ivan Stojmenovic:

On Delivery Guarantees and Worst-Case Forwarding Bounds of Elementary Face Routing Components in Ad Hoc and Sensor Networks. 1224-1238 - Chun-I Fan, Ling-Ying Huang, Pei-Hsiu Ho:

Anonymous Multireceiver Identity-Based Encryption. 1239-1249 - Sylvain Guilley, Laurent Sauvage

, Florent Flament, Vinh-Nga Vong, Philippe Hoogvorst, Renaud Pacalet:
Evaluation of Power Constant Dual-Rail Logics Countermeasures against DPA with Design Time Security Metrics. 1250-1263 - Kris Gaj, Soonhak Kwon, Patrick Baier, Paul Kohlbrenner, Hoang Le, Mohammed Khaleeluddin, Ramakrishna Bachimanchi, Marcin Rogawski:

Area-Time Efficient Implementation of the Elliptic Curve Method of Factoring in Reconfigurable Hardware for Application in the Number Field Sieve. 1264-1280 - Madhukar Anand, Sebastian Fischmeister, Yerang Hur, Jesung Kim, Insup Lee:

Generating Reliable Code from Hybrid-Systems Models. 1281-1294 - Aaram Yun, Jung Hee Cheon, Yongdae Kim

:
On Homomorphic Signatures for Network Coding. 1295-1296
Volume 59, Number 10, October 2010
- Omran Ahmadi, Francisco Rodríguez-Henríquez:

Low Complexity Cubing and Cube Root Computation over F3m in Polynomial Basis. 1297-1308 - Xiangyu Tang, Seongmoon Wang:

A Low Hardware Overhead Self-Diagnosis Technique Using Reed-Solomon Codes for Self-Repairing Chips. 1309-1319 - Takao Yamashita:

Stability-Optimized Time Adjustment for a Networked Computer Clock. 1320-1336 - Li-Pin Chang:

A Hybrid Approach to NAND-Flash-Based Solid-State Disks. 1337-1349 - Mingqiang Li, Jiwu Shu:

DACO: A High-Performance Disk Architecture Designed Specially for Large-Scale Erasure-Coded Storage Systems. 1350-1362 - Holger Lange, Andreas Koch:

Architectures and Execution Models for Hardware/Software Compilation and Their System-Level Realization. 1363-1377 - Hagit Attiya

, David Hay, Isaac Keslassy
:
Packet-Mode Emulation of Output-Queued Switches. 1378-1391 - Xiaofeng Liao, Fei Chen, Kwok-Wo Wong:

On the Security of Public-Key Algorithms Based on Chebyshev Polynomials over the Finite Field $Z_N$. 1392-1401 - Alex Bobrek, JoAnn M. Paul, Donald E. Thomas:

Stochastic Contention Level Simulation for Single-Chip Heterogeneous Multiprocessors. 1402-1418 - Suprasad V. Amari, Liudong Xing, Akhilesh Shrestha, Jennifer Akers, Kishor S. Trivedi:

Performability Analysis of Multistate Computing Systems Using Multivalued Decision Diagrams. 1419-1433 - Hyeran Jeon, Woo Hyong Lee, Sung Woo Chung:

Load Unbalancing Strategy for Multicore Embedded Processors. 1434-1440
Volume 59, Number 11, November 2010
- Tomas Brabec:

Speculatively Redundant Continued Logarithm Representation. 1441-1454 - Martin Omaña, Daniele Rossi

, Cecilia Metra:
High-Performance Robust Latches. 1455-1465 - Heeseung Jo, Hwanju Kim, Jae-Wan Jang, Joonwon Lee, Seungryoul Maeng:

Transparent Fault Tolerance of Device Drivers for Virtual Machines. 1466-1479 - Andrey Mokhov, Alexandre Yakovlev

:
Conditional Partial Order Graphs: Model, Synthesis, and Application. 1480-1493 - Filipa Duarte, Stephan Wong:

Cache-Based Memory Copy Hardware Accelerator for Multicore Systems. 1494-1507 - Song Jiang, Xuechen Zhang, Shuang Liang, Kei Davis

:
Improving Networked File System Performance Using a Locality-Aware Cooperative Cache Protocol. 1508-1519 - Mark Bartlett, Iain Bate, Dimitar Kazakov:

Accurate Determination of Loop Iterations for Worst-Case Execution Time Analysis. 1520-1532 - Abdulhadi Shoufan

, Thorsten Wink, H. Gregor Molter
, Sorin A. Huss, Eike Kohnert:
A Novel Cryptoprocessor Architecture for the McEliece Public-Key Cryptosystem. 1533-1546 - Cuauhtemoc Mancillas-López

, Debrup Chakraborty
, Francisco Rodríguez-Henríquez:
Reconfigurable Hardware Implementations of Tweakable Enciphering Schemes. 1547-1561 - Shouwen Lai, Binoy Ravindran

, Hyeonjoong Cho:
Heterogenous Quorum-Based Wake-Up Scheduling in Wireless Sensor Networks. 1562-1575 - Stijn Eyerman, Lieven Eeckhout:

A Counter Architecture for Online DVFS Profitability Estimation. 1576-1583
Volume 59, Number 12, December 2010
- Jean-Claude Bajard

, Christophe Nègre, Thomas Plantard
:
Subquadratic Space Complexity Binary Field Multiplier Using Double Polynomial Representation. 1585-1597 - Eduardo Quiñones

, Joan-Manuel Parcerisa
, Antonio González
:
Leveraging Register Windows to Reduce Physical Registers to the Bare Minimum. 1598-1610 - Mingqiang Li, Jiwu Shu:

Preventing Silent Data Corruptions from Propagating During Data Reconstruction. 1611-1624 - Saulo Oliveira Dornellas Luiz

, Angelo Perkusich
, Antonio Marcus Nogueira de Lima
:
Multisize Sliding Window in Workload Estimation for Dynamic Power Management. 1625-1639 - Jeonghwan Choi, Sriram Govindan, Jinkyu Jeong

, Bhuvan Urgaonkar, Anand Sivasubramaniam:
Power Consumption Prediction and Power-Aware Packing in Consolidated Environments. 1640-1654 - Wei Yu

, Nan Zhang, Xinwen Fu
, Riccardo Bettati, Wei Zhao
:
Localization Attacks to Internet Threat Monitors: Modeling and Countermeasures. 1655-1668 - Mohamed F. Younis

, Sookyoung Lee, Ameer Ahmed Abbasi:
A Localized Algorithm for Restoring Internode Connectivity in Networks of Moveable Sensors. 1669-1682 - Wencheng Lu, Sartaj Sahni:

Recursively Partitioned Static IP Router Tables. 1683-1690 - Ping Xu, ShiGuang Wang, Xiang-Yang Li:

SALSA: Strategyproof Online Spectrum Admissions for Wireless Networks. 1691-1702 - Inwook Kong, Earl E. Swartzlander Jr.:

A Rounding Method to Reduce the Required Multiplier Precision for Goldschmidt Division. 1703-1708 - S. Q. Zheng:

An Optimal Wide-Sense Nonblocking Distributor. 1709-1714 - Miroslav Knezevic, Frederik Vercauteren

, Ingrid Verbauwhede
:
Faster Interleaved Modular Multiplication Based on Barrett and Montgomery Reduction Methods. 1715-1721 - Francisco J. Cazorla

, Alex Pajuelo
, Oliverio J. Santana
, Enrique Fernández, Mateo Valero
:
On the Problem of Evaluating the Performance of Multiprogrammed Workloads. 1722-1728

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














