Sciweavers

5790 search results - page 976 / 1158
» Distributed programming with distributed authorization
Sort
View
129
Voted
ALT
2004
Springer
15 years 11 months ago
On Kernels, Margins, and Low-Dimensional Mappings
Kernel functions are typically viewed as providing an implicit mapping of points into a high-dimensional space, with the ability to gain much of the power of that space without inc...
Maria-Florina Balcan, Avrim Blum, Santosh Vempala
ICDCN
2010
Springer
15 years 9 months ago
Bandwidth Provisioning in Infrastructure-Based Wireless Networks Employing Directional Antennas
Abstract— Motivated by the widespread proliferation of wireless networks employing directional antennas, we study the problem of provisioning bandwidth in such networks. Given a ...
Shiva Prasad Kasiviswanathan, Bo Zhao, Sudarshan V...
ICS
2009
Tsinghua U.
15 years 9 months ago
MPI-aware compiler optimizations for improving communication-computation overlap
Several existing compiler transformations can help improve communication-computation overlap in MPI applications. However, traditional compilers treat calls to the MPI library as ...
Anthony Danalis, Lori L. Pollock, D. Martin Swany,...
DSN
2009
IEEE
15 years 9 months ago
On the effectiveness of structural detection and defense against P2P-based botnets
Recently, peer-to-peer (P2P) networks have emerged as a covert communication platform for malicious programs known as bots. As popular distributed systems, they allow bots to comm...
Duc T. Ha, Guanhua Yan, Stephan Eidenbenz, Hung Q....
108
Voted
ICPP
2009
IEEE
15 years 8 months ago
Code Semantic-Aware Runahead Threads
Memory-intensive threads can hoard shared resources without making progress on a multithreading processor (SMT), thereby hindering the overall system performance. A recent promisi...
Tanausú Ramírez, Alex Pajuelo, Olive...