Sciweavers

1308 search results - page 231 / 262
» Management of UML Clusters
Sort
View
GLOBECOM
2010
IEEE
13 years 9 months ago
Know Your Enemy, Know Yourself: Block-Level Network Behavior Profiling and Tracking
Abstract. Gaining a better knowledge of one's own network is crucial to effectively manage and secure today's large, diverse campus and enterprise networks. Because of th...
Esam Sharafuddin, Nan Jiang, Yu Jin, Zhi-Li Zhang
PVM
2010
Springer
13 years 8 months ago
Implementing MPI on Windows: Comparison with Common Approaches on Unix
Commercial HPC applications are often run on clusters that use the Microsoft Windows operating system and need an MPI implementation that runs efficiently in the Windows environmen...
Jayesh Krishna, Pavan Balaji, Ewing L. Lusk, Rajee...
ACSAC
2009
IEEE
13 years 8 months ago
RoleVAT: Visual Assessment of Practical Need for Role Based Access Control
Abstract--Role based access control (RBAC) is a powerful security administration concept that can simplify permission assignment management. Migration to and maintenance of RBAC re...
Dana Zhang, Kotagiri Ramamohanarao, Steven Verstee...
IDEAL
2009
Springer
13 years 8 months ago
Implementation and Integration of Algorithms into the KEEL Data-Mining Software Tool
This work is related to the KEEL1 (Knowledge Extraction based on Evolutionary Learning) tool, a non-commercial software that supports data management, design of experiments and an ...
Alberto Fernández, Julián Luengo, Jo...
IJHPCA
2010
111views more  IJHPCA 2010»
13 years 8 months ago
Understanding Application Performance via Micro-benchmarks on Three Large Supercomputers: Intrepid, Ranger and Jaguar
Emergence of new parallel architectures presents new challenges for application developers. Supercomputers vary in processor speed, network topology, interconnect communication ch...
Abhinav Bhatele, Lukasz Wesolowski, Eric J. Bohm, ...