Last update: Fri Mar 2 02:06:23 MST 2018
Top |
Symbols |
Numbers |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Yen:1993:ERS,
author = "I-Ling Yen and E. L. Leiss and F. B. Bastani",
title = "Exploiting redundancy to speed up parallel systems",
journal = j-IEEE-PAR-DIST-TECH,
volume = "1",
number = "3",
pages = "51--60",
month = aug,
year = "1993",
CODEN = "IPDTEX",
DOI = "https://doi.org/10.1109/88.242445",
ISSN = "1063-6552 (print), 1558-1861 (electronic)",
ISSN-L = "1063-6552",
bibdate = "Fri Apr 11 07:24:28 MDT 1997",
bibsource = "Compendex database;
http://www.math.utah.edu/pub/tex/bib/ieeepardisttech.bib",
acknowledgement = ack-nhfb,
affiliation = "MI State Univ",
affiliationaddress = "MI, USA",
classification = "655.1; 723.4; 731.1; C4240P (Parallel programming
and algorithm theory); C5470 (Performance evaluation
and testing); C6110P (Parallel programming)",
corpsource = "Dept. of Comput. Sci., Michigan State Univ., East
Lansing, MI, USA",
journalabr = "IEEE Parallel Distrib Technol",
keywords = "computation power; Control systems; dataflow
computations; fault tolerance; fault tolerant
computing; inherent fault; Parallel processing systems;
parallel program; parallel programming; Parallel
systems; peak; performance; redundancy; redundant
processors; repetitive fault tolerance; Spacecraft;
tolerance; Unmanned space vehicles",
treatment = "P Practical",
}
Related entries
- algorithm,
1(3)12,
1(3)62,
1(3)81,
1(3)83,
1(4)23,
2(1)9,
2(1)51,
2(1)64,
2(2)17,
2(2)30,
2(2)37,
2(2)62,
2(3)27,
2(3)37,
2(3)59,
2(4)32,
2(4)49,
2(4)61,
2(4)73,
3(1)4,
3(1)25,
3(1)61,
3(1)75,
3(2)40,
3(3)63,
3(4)3,
4(1)25,
4(2)15,
4(2)41,
4(2)49,
4(2)63,
4(3)15,
4(3)45,
4(4)36,
4(4)50
- C4240P,
1(3)12,
2(4)61,
4(3)45
- C5470,
1(2)73,
1(3)12,
1(3)33,
2(1)9,
2(2)5,
2(2)37,
2(2)57,
2(2)62,
3(1)51,
3(4)61,
4(1)9,
4(1)25,
4(1)43,
4(1)74,
4(3)25,
4(4)12,
4(4)36
- C6110P,
1(2)62,
1(3)22,
1(3)85,
1(4)23,
1(4)32,
2(1)9,
2(1)26,
2(1)32,
2(1)40,
2(1)64,
2(2)8,
2(2)17,
2(2)30,
2(2)50,
2(3)5,
2(3)8,
2(3)16,
2(3)27,
2(3)37,
2(3)48,
2(3)59,
2(3)71,
2(3)72,
2(3)73,
2(3)76,
2(4)20,
2(4)73,
3(1)4,
3(1)12,
3(1)25,
3(1)37,
3(1)75,
3(2)52,
3(4)3,
3(4)21,
3(4)44,
3(4)72,
4(1)57,
4(2)15,
4(2)26,
4(2)63,
4(2)89,
4(3)15,
4(3)36,
4(4)36,
4(4)50
- computation,
1(4)12,
2(1)26,
2(2)37,
2(2)57,
2(3)48,
2(3)76,
3(1)75,
4(1)9,
4(4)50
- computing,
1(1)6,
1(1)17,
1(1)43,
1(1)52,
1(2)3,
1(2)16,
1(2)73,
1(3)84,
1(4)23,
2(1)26,
2(2)5,
2(2)57,
2(2)62,
2(3)5,
2(3)10,
2(3)16,
2(3)37,
2(4)8,
2(4)9,
2(4)32,
2(4)61,
2(4)73,
3(1)75,
3(2)2,
3(2)14,
3(2)22,
3(2)40,
3(2)52,
3(3)50,
3(4)3,
3(4)8,
3(4)12,
4(1)6,
4(1)57,
4(1)84,
4(2)12,
4(2)41,
4(2)49,
4(2)63,
4(2)89,
4(3)7,
4(3)15,
4(3)60,
4(4)4,
4(4)8,
4(4)12,
4(4)36
- control,
1(2)3,
1(3)82,
2(1)32,
2(4)9,
2(4)32,
2(4)61,
3(2)4,
3(2)14,
3(3)50,
3(4)34,
3(4)61,
4(2)49,
4(4)50
- dataflow,
1(2)49,
3(2)52,
4(4)50
- evaluation,
1(2)33,
1(2)73,
1(3)12,
1(3)33,
2(1)9,
2(2)5,
2(2)37,
2(2)57,
2(2)62,
2(3)37,
2(4)20,
3(1)25,
3(1)51,
3(3)20,
3(4)14,
3(4)21,
3(4)44,
3(4)61,
3(4)72,
4(1)9,
4(1)25,
4(1)43,
4(1)57,
4(1)74,
4(2)26,
4(3)12,
4(3)15,
4(3)25,
4(3)36,
4(3)45,
4(4)12,
4(4)36
- exploiting,
2(2)8,
2(2)17,
2(3)16
- fault,
2(2)62,
2(4)32,
4(4)12
- power,
1(4)23,
2(1)26,
4(2)89,
4(4)36
- processor,
1(1)25,
1(2)21,
1(2)49,
1(2)73,
1(4)23,
2(1)32,
2(1)64,
2(2)30,
2(2)37,
2(2)62,
2(3)8,
2(3)16,
2(3)37,
2(3)59,
2(3)71,
2(3)72,
2(3)73,
2(3)74,
2(3)75,
2(3)76,
2(4)20,
2(4)49,
3(1)12,
3(1)25,
3(2)40,
4(1)9,
4(1)57,
4(2)26,
4(2)49,
4(4)23,
4(4)36,
4(4)50
- space,
2(3)5,
3(2)14
- speed,
2(2)37,
3(3)20,
3(4)3,
3(4)12,
3(4)34
- testing,
1(2)73,
1(3)12,
1(3)33,
1(3)85,
1(4)32,
2(1)9,
2(2)5,
2(2)37,
2(2)50,
2(2)57,
2(2)62,
2(3)37,
3(1)51,
3(1)75,
3(4)21,
3(4)61,
3(4)72,
4(1)9,
4(1)25,
4(1)43,
4(1)57,
4(1)74,
4(2)89,
4(3)12,
4(3)25,
4(3)45,
4(4)12,
4(4)36
- theory,
1(1)6,
1(3)7,
1(3)12,
2(3)16,
2(4)61,
2(4)73,
3(1)12,
3(2)52,
3(4)44,
4(3)36,
4(4)12,
4(4)65
- tolerance,
2(4)32
- tolerant,
2(2)62,
4(4)12