Sciweavers

12863 search results - page 2527 / 2573
» Dynamic Data Mining
Sort
View
DSOM
2003
Springer
14 years 3 months ago
Idiosyncratic Signatures for Authenticated Execution of Management Code
TrustedFlow™ is a software solution to the problem of remotely authenticating code during execution. A continuous flow of idiosyncratic signatures assures that the software from ...
Mario Baldi, Yoram Ofek, Moti Yung
EUROPAR
2003
Springer
14 years 3 months ago
Nswap: A Network Swapping Module for Linux Clusters
Cluster applications that process large amounts of data, such as parallel scientific or multimedia applications, are likely to cause swapping on individual cluster nodes. These ap...
Tia Newhall, Sean Finney, Kuzman Ganchev, Michael ...
ICMI
2003
Springer
111views Biometrics» more  ICMI 2003»
14 years 3 months ago
Distributed and local sensing techniques for face-to-face collaboration
This paper describes techniques that allow users to collaborate on tablet computers that employ distributed sensing techniques to establish a privileged connection between devices...
Ken Hinckley
CGO
2010
IEEE
14 years 3 months ago
Taming hardware event samples for FDO compilation
Feedback-directed optimization (FDO) is effective in improving application runtime performance, but has not been widely adopted due to the tedious dual-compilation model, the dif...
Dehao Chen, Neil Vachharajani, Robert Hundt, Shih-...
DATE
2010
IEEE
157views Hardware» more  DATE 2010»
14 years 3 months ago
RMOT: Recursion in model order for task execution time estimation in a software pipeline
Abstract—This paper addresses the problem of execution time estimation for tasks in a software pipeline independent of the application structure or the underlying architecture. A...
Nabeel Iqbal, M. A. Siddique, Jörg Henkel
« Prev « First page 2527 / 2573 Last » Next »