[net.mag] IEEE Software, July 1985

mauney@ncsu.UUCP (Jon Mauney) (07/09/85)

%A Terrence W. Pratt
%T Pisces: an environment for parallel scientific computation
%J IEEE Software
%V 2
%N 4
%P 7-20
%D JUL 1985
%X the Pisces 1 virtual machine retains sequential programming characteristics,
yet allows for experimentation with the parallel languages that will drive 
the supercomputers of the 1990's 

%A John R. Allen
%A Ken Kennedy
%T A parallel programming environment
%J IEEE Software
%V 2
%N 4
%P 21-29 
%D JUL 1985
%X Automated techniques will not entirely free the programmer from thinking
about parallelism but will uncover natural parallelism in loops and
generate appropriate synchronization primitives to exploit that parallelism. 

%A Perry Emrath
%T Xylem: an operating system for the Cedar multiprocessor
%J IEEE Software
%V 2
%N 4
%P 30-38 
%D JUL 1985
%X Based on version 4.2 of Unix, this system is being implemented in an
extended version of C and features systems calls to support multiprocessing 
within individual programs. 

%A Robert Olson
%T Parallel processing in a message-based operating system
%J IEEE Software
%V 2
%N 4
%P 39-49 
%D JUL 1985
%X As originally designed, the ELXSI System 6400 used messages to acheive
parallelism.  Shared memory capabilities were added later--with surprising 
ease and success. 
 

%A Creve Maples
%T Analyzing software performance in a multiprocessor environment
%J IEEE Software
%V 2
%N 4
%P 50-63 
%D JUL 1985
%X efficient multiprocessing requires ne methods of problem decomposition--
and new debugging and analysis tools for developing and evaluating asynchronous 
parallel programs 

%T International parallel processing projects: a software perspective
%J IEEE Software
%V 2
%N 4
%P 65-80 
%D JUL 1985
%X industrial and academic researchers provide a glimpse into efforts to
develop a faster, more powerful computer through methods beyond purely 
technological advances 

%A Robert L. Glass
%T Software theft
%J IEEE Software
%V 2
%N 4
%P 82-85 
%D JUL 1985
%X Modular decomposition offers a way to ascertain a software theft.
Moreover, the method is straightforward enough for a software-illiterate
judge or jury to understand. 

-- 

Jon Mauney,    mcnc!ncsu!mauney
North Carolina State University