Sciweavers

2232 search results - page 328 / 447
» A Scalable Approach to MPI Application Performance Analysis
Sort
View
CASES
2007
ACM
15 years 8 months ago
Cache leakage control mechanism for hard real-time systems
Leakage energy consumption is an increasingly important issue as the technology continues to shrink. Since on-chip caches constitute a major portion of the processor's transi...
Jaw-Wei Chi, Chia-Lin Yang, Yi-Jung Chen, Jian-Jia...
EUROPKI
2006
Springer
15 years 7 months ago
Pseudonymous PKI for Ubiquitous Computing
Privacy-aware Public Key Infrastructure (PKI) can maintain user access control and yet protect user privacy, which is envisioned as a promising technique in many emerging applicat...
Ke Zeng
146
Voted
ICSE
2004
IEEE-ACM
16 years 4 months ago
Skoll: Distributed Continuous Quality Assurance
Quality assurance (QA) tasks, such as testing, profiling, and performance evaluation, have historically been done in-house on developer-generated workloads and regression suites. ...
Atif M. Memon, Adam A. Porter, Cemal Yilmaz, Adith...
124
Voted
HICSS
2008
IEEE
192views Biometrics» more  HICSS 2008»
15 years 10 months ago
Agent-Based Electricity Balancing with Distributed Energy Resources, A Multiperspective Case Study
Abstract— Distributed generation (DG) of electricity is providing an increasing part of the worldwide electricity supply. At the same time, there is a big potential of demand res...
Koen Kok, Zsófia Derzsi, Jaap Gordijn, Maar...
SASN
2006
ACM
15 years 10 months ago
Attack-resilient hierarchical data aggregation in sensor networks
In a large sensor network, in-network data aggregation, i.e., combining partial results at intermediate nodes during message routing, significantly reduces the amount of communic...
Sankardas Roy, Sanjeev Setia, Sushil Jajodia