Sciweavers

1605 search results - page 232 / 321
» Designing Parallel Operating Systems via Parallel Programmin...
Sort
View
IWSEC
2009
Springer
14 years 2 months ago
Tamper-Tolerant Software: Modeling and Implementation
Abstract. Common software-protection systems attempt to detect malicious observation and modification of protected applications. Upon tamper detection, anti-hacking code may produ...
Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam V...
GRID
2006
Springer
13 years 7 months ago
Grid Deployment of Legacy Bioinformatics Applications with Transparent Data Access
Although grid computing offers great potential for executing large-scale bioinformatics applications, practical deployment is constrained by legacy interfaces. Most widely deployed...
Christophe Blanchet, Rémi Mollon, Douglas T...
DATAMINE
2002
125views more  DATAMINE 2002»
13 years 7 months ago
High-Performance Commercial Data Mining: A Multistrategy Machine Learning Application
We present an application of inductive concept learning and interactive visualization techniques to a large-scale commercial data mining project. This paper focuses on design and c...
William H. Hsu, Michael Welge, Thomas Redman, Davi...
ESCIENCE
2006
IEEE
14 years 1 months ago
TextGrid and eHumanities
TextGrid is a new Grid project in the framework of the German D-Grid initiative, with the aim to deploy Grid technologies for humanities scholars working on historical (German) te...
Peter Gietz, Andreas Aschenbrenner, Stefan Bü...
HPCA
2003
IEEE
14 years 8 months ago
Evaluating the Impact of Communication Architecture on the Performability of Cluster-Based Services
We consider the impact of different communication architectures on the performability (performance + availability) of cluster-based servers. In particular, we use a combination of ...
Kiran Nagaraja, Neeraj Krishnan, Ricardo Bianchini...