Sciweavers

2232 search results - page 233 / 447
» A Scalable Approach to MPI Application Performance Analysis
Sort
View
HIPC
2007
Springer
15 years 10 months ago
Multi-objective Peer-to-Peer Neighbor-Selection Strategy Using Genetic Algorithm
Peer-to-peer (P2P) topology has significant influence on the performance, search efficiency and functionality, and scalability of the application. In this paper, we present a Gen...
Ajith Abraham, Benxian Yue, Chenjing Xian, Hongbo ...
TGC
2005
Springer
15 years 10 months ago
Engineering Runtime Requirements-Monitoring Systems Using MDA Technologies
The Model-Driven Architecture (MDA) technology toolset includes a language for describing the structure of meta-data, the MOF, and a language for describing consistency properties ...
James Skene, Wolfgang Emmerich
DAWAK
2004
Springer
15 years 9 months ago
Mining Periodic Patterns in Sequence Data
Abstract. Periodic pattern mining is the problem that regards temporal regularity. There are many emerging applications in periodic pattern mining, including web usage recommendati...
Kuo-Yu Huang, Chia-Hui Chang
JCS
2010
80views more  JCS 2010»
14 years 11 months ago
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
We introduce constraint differentiation, a powerful technique for reducing search when model-checking security protocols using constraint-based methods. Constraint differentiation...
Sebastian Mödersheim, Luca Viganò, Dav...
BIRTHDAY
2012
Springer
14 years 5 days ago
A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors
3-D integration presents many new opportunities for architects and embedded systems designers. However, 3-D integration has not yet been explored by the cryptographic hardware com...
Jonathan Valamehr, Ted Huffmire, Cynthia E. Irvine...