Sciweavers

13631 search results - page 2492 / 2727
» Event-Based Performance Analysis
Sort
View
108
Voted
CLUSTER
2004
IEEE
15 years 6 months ago
A comparison of local and gang scheduling on a Beowulf cluster
Gang Scheduling and related techniques are widely believed to be necessary for efficientjob scheduling on distributed memory parallel computers. This is hecause they minimize cont...
Peter E. Strazdins, John Uhlmann
130
Voted
DATE
2004
IEEE
152views Hardware» more  DATE 2004»
15 years 6 months ago
A Design Methodology for the Exploitation of High Level Communication Synthesis
In this paper we analyse some methodological concerns that have to be faced in a design flow which contains automatic synthesis phases from high-level, system descriptions. In par...
Francesco Bruschi, Massimo Bombana
166
Voted
CANS
2006
Springer
136views Cryptology» more  CANS 2006»
15 years 6 months ago
Watermarking Essential Data Structures for Copyright Protection
Software watermarking is a new research area that aims at providing copyright protection for commercial software. It minimizes software piracy by hiding copyright signatures inside...
Qutaiba Albluwi, Ibrahim Kamel
CCS
2006
ACM
15 years 6 months ago
Beyond separation of duty: an algebra for specifying high-level security policies
A high-level security policy states an overall requirement for a sensitive task. One example of a high-level security policy is a separation of duty policy, which requires a sensi...
Ninghui Li, Qihua Wang
141
Voted
CLEF
2006
Springer
15 years 6 months ago
Medical Image Annotation and Retrieval Using Visual Features
In this article, we present the algorithms and results of our participation in the medical image annotation and retrieval tasks of ImageCLEFmed 2006. We exploit both global featur...
Jing Liu, Yang Hu, Mingjing Li, Songde Ma, Wei-Yin...
« Prev « First page 2492 / 2727 Last » Next »