Sciweavers

4330 search results - page 759 / 866
» Analyzing security architectures
Sort
View
145
Voted
IPSN
2004
Springer
15 years 9 months ago
Naps: scalable, robust topology management in wireless ad hoc networks
Topology management schemes conserve energy in wireless ad hoc networks by identifying redundant nodes that may turn off their radios or other components while maintaining connec...
Brighten Godfrey, David Ratajczak
120
Voted
JSSPP
2004
Springer
15 years 9 months ago
Reconfigurable Gang Scheduling Algorithm
 Using a single traditional gang scheduling algorithm cannot provide the best performance for all workloads and parallel architectures. A solution for this problem is the use of...
Luís Fabrício Wanderley Góes,...
131
Voted
OTM
2004
Springer
15 years 9 months ago
Managing Long Running Queries in Grid Environment
Exceptionally large amounts of both distributed data and computational resources are becoming available through the Grid. This will enable efficient exchange and processing of very...
Ruslan Fomkin, Tore Risch
149
Voted
PARA
2004
Springer
15 years 9 months ago
Automatic Derivation of Linear Algebra Algorithms with Application to Control Theory
It is our belief that the ultimate automatic system for deriving linear algebra libraries should be able to generate a set of algorithms starting from the mathematical specificati...
Paolo Bientinesi, Sergey Kolos, Robert A. van de G...
137
Voted
VECPAR
2004
Springer
15 years 9 months ago
Distributed Processing of Large BioMedical 3D Images
The Human Genetics Unit (HGU) of the Medical Research Council (MRC) in Edinburgh has developed the Edinburgh Mouse Atlas, a spatial temporal framework to store and analyze biologic...
Konstantinos Liakos, Albert Burger, Richard A. Bal...