Results 1 - 10
of
9,727
The program dependence graph and its use in optimization
- ACM Transactions on Programming Languages and Systems
, 1987
"... In this paper we present an intermediate program representation, called the program dependence graph (PDG), that makes explicit both the data and control dependence5 for each operation in a program. Data dependences have been used to represent only the relevant data flow relationships of a program. ..."
Abstract
-
Cited by 996 (3 self)
- Add to MetaCart
In this paper we present an intermediate program representation, called the program dependence graph (PDG), that makes explicit both the data and control dependence5 for each operation in a program. Data dependences have been used to represent only the relevant data flow relationships of a program
The Determinants of Credit Spread Changes.
- Journal of Finance
, 2001
"... ABSTRACT Using dealer's quotes and transactions prices on straight industrial bonds, we investigate the determinants of credit spread changes. Variables that should in theory determine credit spread changes have rather limited explanatory power. Further, the residuals from this regression are ..."
Abstract
-
Cited by 422 (2 self)
- Add to MetaCart
-grade bond yield changes on Treasury yield changes and stock returns (see Kwan (1996)) we find that the R 2 falls to five percent when the dependent variable is credit spread changes. Hence, while much is known about yield changes, we have very limited knowledge about the determinants of credit spread
Fixing the Java memory model
- In ACM Java Grande Conference
, 1999
"... This paper describes the new Java memory model, which has been revised as part of Java 5.0. The model specifies the legal behaviors for a multithreaded program; it defines the semantics of multithreaded Java programs and partially determines legal implementations of Java virtual machines and compile ..."
Abstract
-
Cited by 385 (10 self)
- Add to MetaCart
they rely on a strong notion of data and control dependences that precludes some standard compiler transformations. Although the majority of what is currently done in compilers is legal, the new model introduces significant differences, and clearly defines the boundaries of legal transformations
Automatic Translation of FORTRAN Programs to Vector Form
- ACM Transactions on Programming Languages and Systems
, 1987
"... This paper discusses the theoretical concepts underlying a project at Rice University to develop an automatic translator, called PFC (for Parallel FORTRAN Converter), from FORTRAN to FORTRAN 8x. The Rice project, based initially upon the research of Kuck and others at the University of Illinois [6, ..."
Abstract
-
Cited by 329 (34 self)
- Add to MetaCart
in this section to extend dependence to multiple statements and multiple loops. Section 5 develops dependence-based algorithms for code generation and transformations for enhancing the parallelism of a statement. Section 6 describes a method for extending the power of data dependence to control statements
Secure Program Execution via Dynamic Information Flow Tracking
, 2004
"... Dynamic information flow tracking is a hardware mechanism to protect programs against malicious attacks by identifying spurious information flows and restricting the usage of spurious information. Every security attack to take control of a program needs to transfer the program’s control to malevolen ..."
Abstract
-
Cited by 271 (3 self)
- Add to MetaCart
Dynamic information flow tracking is a hardware mechanism to protect programs against malicious attacks by identifying spurious information flows and restricting the usage of spurious information. Every security attack to take control of a program needs to transfer the program’s control
Global and regional climate changes due to black carbon,
- Nat. Geosci.,
, 2008
"... Figure 1: Global distribution of BC sources and radiative forcing. a, BC emission strength in tons per year from a study by Bond et al. Full size image (42 KB) Review Nature Geoscience 1, 221 -227 (2008 Black carbon in soot is the dominant absorber of visible solar radiation in the atmosphere. Ant ..."
Abstract
-
Cited by 228 (5 self)
- Add to MetaCart
clouds, with vertical extents of 3 to 5 km. Because of the combination of high absorption, a regional distribution roughly aligned with solar irradiance, and the capacity to form widespread atmospheric brown clouds in a mixture with other aerosols, emissions of black carbon are the second strongest
The strengthening the reporting of observational studies in epidemiology (STROBE) statement: guidelines for reporting observational studies.
- PLoS Med
, 2007
"... A B S T R A C T Much biomedical research is observational. The reporting of such research is often inadequate, which hampers the assessment of its strengths and weaknesses and of a study's generalisability. The Strengthening the Reporting of Observational Studies in Epidemiology (STROBE) Initi ..."
Abstract
-
Cited by 207 (1 self)
- Add to MetaCart
) Initiative developed recommendations on what should be included in an accurate and complete report of an observational study. We defined the scope of the recommendations to cover three main study designs: cohort, case-control, and cross-sectional studies. We convened a 2-day workshop in September 2004
Introducing the Tileworld: Experimentally evaluating agent architectures
- In Proceedings of the National Conference on Artificial Intelligence
, 1990
"... We describe a system called Tileworld, which consists of a simulated robot agent and a simulated environment which is both dynamic and unpredictable. Both the agent and the environment are highly parameterized, enabling one to control certain characteristics of each. We can thus experimentally inves ..."
Abstract
-
Cited by 195 (13 self)
- Add to MetaCart
We describe a system called Tileworld, which consists of a simulated robot agent and a simulated environment which is both dynamic and unpredictable. Both the agent and the environment are highly parameterized, enabling one to control certain characteristics of each. We can thus experimentally
Analysis of a cone-based distributed topology control algorithm for wireless multi-hop networks
- In ACM Symposium on Principle of Distributed Computing (PODC
, 2001
"... bahl~microsoft, corn ymwang~microsoft, corn rogerwa~microsoft, corn The topology of a wireless multi-hop network can be con-trolled by varying the transmission power at each node. In this paper, we give a detailed analysis of a cone-based dis-tributed topology control algorithm. This algorithm, intr ..."
Abstract
-
Cited by 174 (14 self)
- Add to MetaCart
bahl~microsoft, corn ymwang~microsoft, corn rogerwa~microsoft, corn The topology of a wireless multi-hop network can be con-trolled by varying the transmission power at each node. In this paper, we give a detailed analysis of a cone-based dis-tributed topology control algorithm. This algorithm
Working-memory capacity and the control of attention: The contributions of goal neglect, response competition, and task set to Stroop interference
- JOURNAL OF EXPERIMENTAL PSYCHOLOGY GENERAL
, 2003
"... Individual differences in working-memory (WM) capacity predicted performance on the Stroop task in 5 experiments, indicating the importance of executive control and goal maintenance to selective attention. When the Stroop task encouraged goal neglect by including large numbers of congruent trials (R ..."
Abstract
-
Cited by 169 (9 self)
- Add to MetaCart
Individual differences in working-memory (WM) capacity predicted performance on the Stroop task in 5 experiments, indicating the importance of executive control and goal maintenance to selective attention. When the Stroop task encouraged goal neglect by including large numbers of congruent trials
Results 1 - 10
of
9,727