Now showing items 195-214 of 492

    • Hardware Estimatino of a Process' Primary Memory Requirements 

      Gifforf, David K. (1977-01)
      It is shown that a process' primary memory requirements can be approximated by use of the miss rate in the Honeywell 6180's page table word associative memory. This primary memory requirement estimate was employed by an ...
    • Helping People Think 

      Goldstein, Robert C. (1971-04)
      Everyone, today, is familiar with the use of machines to ease physical burdens. Since the dawn of civilization, man's progress in gaining control over his environment has been largely determined by the power and sophistication ...
    • Hierarchical Compilation of Macro Dataflow Graphs for Multiprocessors with Local Memory 

      Prasanna, G.N. Srinivasa; Agarwal, Anant; Musicus, Bruce R. (1992-10)
      This paper presents a hierarchical approach for compiling macro dataflow graphs for multiprocessors with local memory. Macro dataflow graphs comprise several nodes (or macros operations) that must be executed subject to ...
    • Hierarchical Compilation of Macro Dataflow Graphs for Multiprocessors with Local Memory 

      Prasanna, G.N. Srinivasa; Agarwal, Anant; Musicus, Bruce R. (1992-12)
      This paper presents a hierarchical approach for compiling macro dataflow graphs for multiprocessors with local memory. Macro dataflow graphs comprise several nodes (or macros operations) that must be executed subject to ...
    • Hierarchical Inequality Reasoning 

      Sacks, Elisha P. (1987-02)
      This paper describes a program called BOUNDER that proves inequalities between elementary functions over finite sets of constraints. Previous inequality algorithms perform well on some subset of the elementary functions, ...
    • Hoare's Logic Is Not Complete When It Could Be 

      Bergstra, J.; Chielinksa, A.; Tiuryn, J. (1982-08)
      It is known (cf.[2]) that is the Hoare rules are complete for a first-order structure A, then the set of partial correctness assertions true over A is recursive in the first-order theory of A. We show that the converse is ...
    • How Can We Compute with Arrays of Nanstructures? 

      Biafore, Michael (1994-08)
      In part the goal of the Ultra Program is to extract useful computation from nanometer scale effects. To accomplish this goal those of us who are computer scientists must communicate clearly to those of you who are chemists ...
    • How to Assemble Tree Machines 

      Bhatt, Sandeep Nautam; Leiserson, Charles E. (1984-03)
      Many researchers have proposed that ensembles of processing elements be organized as trees. This paper explores how large tree machines can be assembled efficiently from smaller components. A principal constraint considered ...
    • How to Build Scalable On-Chip ILP Networks for a Decentralized Architecture 

      Taylor, Michael Bedford; Lee, Walter; Frank, Matthew; Amarasinghe, Saman; Agarwal, Anant (2000-04)
      The era of billion transistors-on-a-chip is creating a completely different set of design constraints, forcing radically new microprocessor archiecture designs. This paper examines a few of the possible microarchitectures ...
    • How to Construct Random Functions 

      Goldreich, Oded; Goldwasser, Shafi; Micali, Silvio (1982-11)
      We assume that functions that are one-way in a very weak sense exist. We prove that in probabilitic polynomial time it is possible to construct deterministic polynomial time computable functions g:{1,…,2^k} -> {1,…,2^k} ...
    • How to Share a Secret 

      Shamir, Adi (1979-05)
      In this paper we show how to divide data D into n pieces in such a way that D is easily reconstructable from any k pieces, but even complete knowledge of k-1 pieces reveals absolutely no information about D. This technique ...
    • How to Sign Given Any Trapdoor Permutation 

      Bellare, Mihir; Micali, Silvio (1990-06)
      We present a digital signature scheme which is based on the existence of any trapdoor permutation. Our scheme is secure in the strongest possible natural sense: namely, it is secure against existential forgery under ...
    • Hybrid Atomicity for Nested Transactions 

      Fekete, Alan; Lynch, Nancy A.; Weihl, William E. (1992-10)
      This paper defines the notion of hybrid atomicity for nested transaction systems, and presents and verifies an algorithm providing this property. Hybrid atomicity is a modular property; it allows the correctness of a system ...
    • Hybrid Caching for Scalable Oject Systems (Think Globally, Act Locally) 

      O'Toole, James; Shrira, Liuba (1994-04)
      Object-based client caching allows clients to keep more frequently accessed objects while discarding colder objects that reside on the same page. However, when these objects are modified and sent to the server, it may need ...
    • Hybrid I/O Automata 

      Lynch, Nancy A.; Segala, Roberto; Vaandrager, Frits; Weinberg, H. B. (1995-12)
      We propose a new hybrid I/O automaton model that is capable of describing both continuous and discrete behavior. The model, which extends the timed I/O automaton model of [12, 7] and the phase transition system models of ...
    • I/O Automata: A Model for Discrete Event Systems 

      Lynch, Nancy A. (1988-03)
    • The Impact of Communication Locality on Large-scale Multiprocessor Performance 

      Johnson, Kirk L. (1992-02)
      As multiprocessor sizes scale and computer architects turn to interconnection networks with non-uniform communication latencies, the lure of exploiting communication locality to increase performance becomes inevitable. ...
    • The Impact of Communication Locality on Large-scale Multiprocessor Performance 

      Johnson, Kirk L. (1992-06)
      As multiprocessor sizes scale and computer architects turn to interconnection networks with non-uniform communication latencies, the lure of exploiting communication locality to increase performance becomes inevitable. ...
    • The Impact of Synchronous Communication on. The Problem of Electing a Leader in a Ring 

      Lynch, Nancy A.; Frederickson, Greg N. (1984-04)
      We consider the problem of electing a leader in a synchronous ring of n processors. We obtain both positive and negative results. One the one hand, we show that if processor ID's are chosen from some countable set, then ...