منابع مشابه
Automatic Pro ling of MPI Applications with Hardware Performance Counters
This paper presents an automatic counter instrumentation and pro ling module added to the MPI library on Cray T3E and SGI Origin2000 systems. A detailed summary of the hardware performance counters and the MPI calls of any MPI production program is gathered during execution and written in MPI Finalize on a special syslog le. The user can get the same information in a di erent le. Statistical su...
متن کاملAutomatic Profiling of MPI Applications with Hardware Performance Counters
This paper presents an automatic counter instrumentation and profiling module added to the MPI library on Cray T3E and SGI Origin2000 systems. A detailed summary of the hardware performance counters and the MPI calls of any MPI production program is gathered during execution and written in MPI_Finalize on a special syslog file. The user can get the same information in a different file. Statisti...
متن کاملDetection of β-Thalassemia Carriers by Red Cell Parameters Obtained from Automatic Counters using Mathematical Formulas
Background β-thalassemia major is a severe disease with high morbidity. The world prevalence of carriers is around 1.5-7%. The present study aimed to find a reliable formula for detecting β-thalassemia carriers using an extensive database of more than 22,000 samples obtained from a homogeneous population of childbearing age women with 3161 (13.6%) of β-thalassemia carriers and to check previous...
متن کاملThe Firs Cerenkov Counters*
The separation of charged kaons from the more copiously produced pions adds significantly to the analyzing power of e+edetectors. Time-of-flight techniques provide this separation up to about 1 GeV/c. However, at PEP and PETRA energies a large proportion of particles have momenta above this range. A useful device to tag kaons above 1 GeVjc would be a threshold Cerenkov counter. Due to the tight...
متن کاملEvent Driven Private Counters
We define and instantiate a cryptographic scheme called “private counters”, which can be used in applications such as preferential voting to express and update preferences (or any secret) privately and non-interactively. A private counter consists of an encrypted value together with rules for updating that value if certain events occur. Updates are private: the rules do not reveal how the value...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Clinical Pathology
سال: 1972
ISSN: 0021-9746
DOI: 10.1136/jcp.25.11.1011-b