Sciweavers

2968 search results - page 529 / 594
» Network Programming Using PLAN
Sort
View
ICCS
2009
Springer
14 years 5 months ago
A Holistic Approach for Performance Measurement and Analysis for Petascale Applications
Abstract. Contemporary high-end Terascale and Petascale systems are composed of hundreds of thousands of commodity multi-core processors interconnected with high-speed custom netwo...
Heike Jagode, Jack Dongarra, Sadaf R. Alam, Jeffre...
ICCCN
2007
IEEE
14 years 4 months ago
Containing Hitlist-Based Worms with Polymorphic Signatures
—Worms are a significant threat to network systems, both through resource consumption and malicious activity. This paper examines the spread of a class of hitlist-based worms tha...
Theodor Richardson, Chin-Tser Huang
CCGRID
2006
IEEE
14 years 4 months ago
Adapting Distributed Shared Memory Applications in Diverse Environments
A problem with running distributed shared memory applications in heterogeneous environments is that making optimal use of available resources often requires significant changes t...
Daniel Potts, Ihor Kuz
LOCA
2005
Springer
14 years 4 months ago
Context Obfuscation for Privacy via Ontological Descriptions
Context information is used by pervasive networking and context-aware programs to adapt intelligently to different environments and user tasks. As the context information is poten...
Ryan Wishart, Karen Henricksen, Jadwiga Indulska
FPL
2009
Springer
99views Hardware» more  FPL 2009»
14 years 3 months ago
Exploiting fast carry-chains of FPGAs for designing compressor trees
Fast carry chains featuring dedicated adder circuitry is a distinctive feature of modern FPGAs. The carry chains bypass the general routing network and are embedded in the logic b...
Hadi Parandeh-Afshar, Philip Brisk, Paolo Ienne