457 research outputs found

    Probabilistic Analysis and Algorithms for Reconfiguration of Memory Arrays

    Get PDF
    Coordinated Science Laboratory was formerly known as Control Systems LaboratoryPublication date of November 1990 on the cover of some copies was evidently a typographical error, and May 1990 is the correct date.Semiconductor Research Corporation (SRC) / 89-DP-10

    Lazy Checkpoint Coordination for Bounding Rollback Propagation

    Get PDF
    Coordinated Science Laboratory was formerly known as Control Systems LaboratoryNational Aeronautics and Space Administration / NASA NAG 1-613Department of the Navy managed by the Office of the Chief of Naval Research / N00014-91-J-128

    TRAPEDS: Producing Traces for Multicomputers via Execution-Driven Simulation

    Get PDF
    Coordinated Science Laboratory was formerly known as Control Systems LaboratoryNational Aeronautics and Space Administration / NASA NAG-1-613Shell Doctoral FellowshipDigital Faculty Incentives for Excellence Awar

    Optimal Message Log Reclamation for Independent Checkpointing

    Get PDF
    Coordinated Science Laboratory was formerly known as Control Systems LaboratoryNational Aeronautics and Space Administration / NASA NAG 1-613Department of the Navy managed by the Office of the Chief of Naval Research / N00014-91-J-128

    Recoverable Distributed Shared Memory Under Sequential and Relaxed Consistency

    Get PDF
    Coordinated Science Laboratory was formerly known as Control Systems LaboratoryOffice of Naval Research / N00014-90-J-1270 and N00014-91-J-1283National Aeronautics and Space Administration / NASA NAG 1-61

    Review of a partial care program for severely emotionally disturbed youth

    Get PDF
    The need for research on programs for Emotionally Disturbed (ED) children and adolescents is great. The present study examined a partial care program for ED youth in New Jersey. There were 120 subjects in this study. Several characteristics of these subjects were examined – gender, race, age, diagnosis, and family status. The study also examined the subjects\u27 average length of stay in the program.and reasons for being discharged. In addition, the ratio of clients to staff was studied. The data was collected by examining the files of past and present clients to gather the necessary information. Descriptive statistics were used to analyze the results. The majority of the subjects were African American males between the ages of 12 and 15 years. Most were either diagnosed Conduct Disorder or Oppositional Defiant Disorder and most lived with a single parent. The overall length of stay for the subjects was 8 months. Most of them were discharged due to refusal of service or to another placement. The ratio of clients to staff varied from 6 to 1 to 3 to 1 over the three year period studied

    Compiler-assisted multiple instruction rollback recovery using a read buffer

    Get PDF
    Multiple instruction rollback (MIR) is a technique that has been implemented in mainframe computers to provide rapid recovery from transient processor failures. Hardware-based MIR designs eliminate rollback data hazards by providing data redundancy implemented in hardware. Compiler-based MIR designs have also been developed which remove rollback data hazards directly with data-flow transformations. This paper describes compiler-assisted techniques to achieve multiple instruction rollback recovery. We observe that some data hazards resulting from instruction rollback can be resolved efficiently by providing an operand read buffer while others are resolved more efficiently with compiler transformations. The compiler-assisted scheme presented consists of hardware that is less complex than shadow files, history files, history buffers, or delayed write buffers, while experimental evaluation indicates performance improvement over compiler-based schemes

    An implementation and performance measurement of the progressive retry technique

    Get PDF
    This paper describes a recovery technique called progressive retry for bypassing software faults in message-passing applications. The technique is implemented as reusable modules to provide application-level software fault tolerance. The paper describes the implementation of the technique and presents results from the application of progressive retry to two telecommunications systems. the results presented show that the technique is helpful in reducing the total recovery time for message-passing applications

    Analytic Expressions for Singular Vectors of the N=2N=2 Superconformal Algebra

    Get PDF
    Using explicit expressions for a class of singular vectors of the N=2N=2 (untwisted) algebra and following the approach of Malikov-Feigin-Fuchs and Kent, we show that the analytically extended Verma modules contain two linearly independent neutral singular vectors at the same grade. We construct this two dimensional space and we identify the singular vectors of the original Verma modules. We show that in some Verma modules these expressions lead to two linearly independent singular vectors which are at the same grade and have the same charge.Comment: 35 pages, LATE

    Design and Scheduling for Periodic Concurrent Error Detection and Recovery in Processor Arrays

    Get PDF
    Coordinated Science Laboratory was formerly known as Control Systems LaboratoryNational Aeronautics and Space Administration / NASA NAG 1-613Joint Services Electronics Program / N00014-90-J-127
    corecore