Sciweavers

349 search results - page 29 / 70
» A case for end system multicast
Sort
View
SC
2004
ACM
14 years 1 months ago
Improving Throughput for Grid Applications with Network Logistics
This work describes a technique for improving network performance in Grid environments that we refer to as “logistics.” We demonstrate that by using storage and cooperative fo...
D. Martin Swany
IPPS
2007
IEEE
14 years 1 months ago
Detecting Runtime Environment Interference with Parallel Application Behavior
Many performance problems observed in high end systems are actually caused by the runtime system and not the application code. Detecting these cases will require parallel performa...
Rashawn L. Knapp, Karen L. Karavanic, Douglas M. P...
SCS
2004
13 years 9 months ago
Contract-Based Justification for COTS Component within Safety Critical Applications
Commercial-Off-The-Shelf (COTS) software components are being used within complex safety-critical applications. However, to use them with confidence, it is necessary to ensure tha...
Fan Ye, Tim Kelly
HICSS
2008
IEEE
97views Biometrics» more  HICSS 2008»
14 years 2 months ago
The Organizing Pattern of Interaction: A Knowledge Centric Approach
The organizing pattern of interaction moves from less to more understanding about the relationships that exist between concepts. The current view of organizing activities is prima...
Douglas A. Druckenmiller
COMCOM
2008
84views more  COMCOM 2008»
13 years 7 months ago
SecureStream: An intrusion-tolerant protocol for live-streaming dissemination
Peer-to-peer (P2P) dissemination systems are vulnerable to attacks that may impede nodes from receiving data in which they are interested. The same properties that lead P2P system...
Maya Haridasan, Robbert van Renesse