Sciweavers

3584 search results - page 543 / 717
» Parallel Computing of Thermoelasticity Problems
Sort
View
COLCOM
2008
IEEE
14 years 4 months ago
Security through Collaboration in MANETs
It is well understood that Mobile Ad Hoc Networks (MANETs) are extremely susceptible to a variety of attacks, and traditional security mechanisms do not work well. Many security sc...
Wenjia Li, James Parker, Anupam Joshi
FOCS
2008
IEEE
14 years 4 months ago
The Bayesian Learner is Optimal for Noisy Binary Search (and Pretty Good for Quantum as Well)
We use a Bayesian approach to optimally solve problems in noisy binary search. We deal with two variants: • Each comparison is erroneous with independent probability 1 − p. ...
Michael Ben-Or, Avinatan Hassidim
CCGRID
2007
IEEE
14 years 4 months ago
Executing Large Parameter Sweep Applications on a Multi-VO Testbed
Applications that span multiple virtual organizations (VOs) are of great interest to the eScience community. However, recent attempts to execute large-scale parameter sweep applic...
Shahaan Ayyub, David Abramson, Colin Enticott, Sla...
CLUSTER
2007
IEEE
14 years 4 months ago
Dynamic scheduling of multi-processor tasks on clusters of clusters
— In this article we tackle the problem of scheduling a dynamically generated DAG of multi-processor tasks (M-tasks). At first, we outline the need of such a scheduling approach...
Sascha Hunold, Thomas Rauber, Gudula Rünger
IEEEPACT
2007
IEEE
14 years 4 months ago
Verification-Aware Microprocessor Design
The process of verifying a new microprocessor is a major problem for the computer industry. Currently, architects design processors to be fast, power-efficient, and reliable. Howe...
Anita Lungu, Daniel J. Sorin