|
|
|
Zusatzmaterial |
Bemerkungen |
Busato & Bombieri (2019): "Configuring Graph Traversal Applications for GPUs: Analysis of Implementation Strategies and their Correlation with Graph Characteristics" |
|
Canon et al. (2019): "A Comparison of Random Task Graph Generation Methods for Scheduling Problems" |
|
Echtle (2019): "Non-Arbitrary Keys of Fault-Tolerance Signatures" |
|
Fernández-Fabeiro et al. (2019): "Simplifying the Distributed Multi-GPU Programming of a Hyperspectral Image Registration Algorithm" |
|
Keller & Kessler (2019): "Dealing with Hardware Faults in Energy-Efficient Static Schedules of Multi-Variant Programs on Heterogeneous Platforms" |
|
Lamport (1981): "Password Authentication with Insecure Communication" |
|
Litzinger et al. (2019): "Scheduling Moldable Parallel Streaming Tasks on Heterogeneous Platforms with Frequency Scaling" |
|
Netti et al. (2019): "Online Fault Classification in HPC Systems Through Machine Learning" |
|
Samek et al. (2017): "Explainable Artificial Intelligence: Understanding, Visualizing and Interpreting Deep Learning Models" |
|
Shamir (1985): "Identity-Based Cryptosystems and Signature Schemes" |
|
Veenboer & Romein (2019): "Radio-Astronomical Imaging: FPGAs vs GPUs" |
|
de Wynter (2019): "On the Bounds of Function Approximations" |
|
Yuval (1979): "How to swindle Rabin" |
|