Sciweavers

2232 search results - page 328 / 447
» A Scalable Approach to MPI Application Performance Analysis
Sort
View
CASES
2007
ACM
14 years 29 days ago
Cache leakage control mechanism for hard real-time systems
Leakage energy consumption is an increasingly important issue as the technology continues to shrink. Since on-chip caches constitute a major portion of the processor's transi...
Jaw-Wei Chi, Chia-Lin Yang, Yi-Jung Chen, Jian-Jia...
EUROPKI
2006
Springer
14 years 19 days ago
Pseudonymous PKI for Ubiquitous Computing
Privacy-aware Public Key Infrastructure (PKI) can maintain user access control and yet protect user privacy, which is envisioned as a promising technique in many emerging applicat...
Ke Zeng
ICSE
2004
IEEE-ACM
14 years 9 months ago
Skoll: Distributed Continuous Quality Assurance
Quality assurance (QA) tasks, such as testing, profiling, and performance evaluation, have historically been done in-house on developer-generated workloads and regression suites. ...
Atif M. Memon, Adam A. Porter, Cemal Yilmaz, Adith...
HICSS
2008
IEEE
192views Biometrics» more  HICSS 2008»
14 years 3 months ago
Agent-Based Electricity Balancing with Distributed Energy Resources, A Multiperspective Case Study
Abstract— Distributed generation (DG) of electricity is providing an increasing part of the worldwide electricity supply. At the same time, there is a big potential of demand res...
Koen Kok, Zsófia Derzsi, Jaap Gordijn, Maar...
SASN
2006
ACM
14 years 2 months ago
Attack-resilient hierarchical data aggregation in sensor networks
In a large sensor network, in-network data aggregation, i.e., combining partial results at intermediate nodes during message routing, significantly reduces the amount of communic...
Sankardas Roy, Sanjeev Setia, Sushil Jajodia