Sciweavers

968 search results - page 150 / 194
» Evaluating Benchmark Subsetting Approaches
Sort
View
ICAC
2008
IEEE
14 years 2 months ago
CARVE: A Cognitive Agent for Resource Value Estimation
Recently, industry has begun investigating and moving towards utility computing, where computational resources (processing, memory and I/O) are availably on demand at a market cos...
Jonathan Wildstrom, Peter Stone, Emmett Witchel
ICSM
2008
IEEE
14 years 2 months ago
Change impact analysis for AspectJ programs
Change impact analysis is a useful technique for software evolution. It determines the effects of a source editing session and provides valuable feedbacks to the programmers for m...
Sai Zhang, Zhongxian Gu, Yu Lin, Jianjun Zhao
ACSAC
2007
IEEE
14 years 2 months ago
MetaAware: Identifying Metamorphic Malware
Detection of malicious software (malware) by the use of static signatures is often criticized for being overly simplistic. Available methods of obfuscating code (so-called metamor...
Qinghua Zhang, Douglas S. Reeves
IPPS
2007
IEEE
14 years 2 months ago
Building the Tree of Life on Terascale Systems
Bayesian phylogenetic inference is an important alternative to maximum likelihood-based phylogenetic method. However, inferring large trees using the Bayesian approach is computat...
Xizhou Feng, Kirk W. Cameron, Carlos P. Sosa, Bria...
IPPS
2007
IEEE
14 years 2 months ago
Improving MPI Independent Write Performance Using A Two-Stage Write-Behind Buffering Method
Many large-scale production applications often have very long executions times and require periodic data checkpoints in order to save the state of the computation for program rest...
Wei-keng Liao, Avery Ching, Kenin Coloma, Alok N. ...