Sciweavers

886 search results - page 146 / 178
» A High Performance Simulator System for a Multiprocessor Sys...
Sort
View
ICDE
2012
IEEE
227views Database» more  ICDE 2012»
11 years 10 months ago
Temporal Analytics on Big Data for Web Advertising
—“Big Data” in map-reduce (M-R) clusters is often fundamentally temporal in nature, as are many analytics tasks over such data. For instance, display advertising uses Behavio...
Badrish Chandramouli, Jonathan Goldstein, Songyun ...
IPPS
2007
IEEE
14 years 2 months ago
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols
Most of the current trust models in peer-to-peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer’s ide...
Li Lu, Jinsong Han, Lei Hu, Jinpeng Huai, Yunhao L...
IWMM
2007
Springer
110views Hardware» more  IWMM 2007»
14 years 2 months ago
Path: page access tracking to improve memory management
Traditionally, operating systems use a coarse approximation of memory accesses to implement memory management algorithms by monitoring page faults or scanning page table entries. ...
Reza Azimi, Livio Soares, Michael Stumm, Thomas Wa...
CEC
2010
IEEE
13 years 9 months ago
An analysis of massively distributed evolutionary algorithms
Computational science is placing new demands on optimization algorithms as the size of data sets and the computational complexity of scientific models continue to increase. As thes...
Travis J. Desell, David P. Anderson, Malik Magdon-...
INFOCOM
2008
IEEE
14 years 2 months ago
Dynamic Jamming Mitigation for Wireless Broadcast Networks
—Wireless communications are inherently symmetric; that is, it takes an attacker the same amount of power to modulate a signal as it does for a legitimate node to modulate the sa...
Jerry T. Chiang, Yih-Chun Hu