Sciweavers

4624 search results - page 179 / 925
» Performance Evaluation of HPCN Applications
Sort
View
ICST
2011
IEEE
13 years 2 months ago
Tailored Shielding and Bypass Testing of Web Applications
User input validation is a technique to counter attacks on web applications. In typical client-server architectures, this validation is performed on the client side. This is ineff...
Tejeddine Mouelhi, Yves Le Traon, Erwan Abgrall, B...
IISWC
2008
IEEE
14 years 5 months ago
STAMP: Stanford Transactional Applications for Multi-Processing
Abstract—Transactional Memory (TM) is emerging as a promising technology to simplify parallel programming. While several TM systems have been proposed in the research literature,...
Chi Cao Minh, JaeWoong Chung, Christos Kozyrakis, ...
SIGCOMM
2005
ACM
14 years 4 months ago
A case study in building layered DHT applications
Recent research has shown that one can use Distributed Hash Tables (DHTs) to build scalable, robust and efficient applications. One question that is often left unanswered is that ...
Yatin Chawathe, Sriram Ramabhadran, Sylvia Ratnasa...
ADC
2004
Springer
97views Database» more  ADC 2004»
14 years 4 months ago
A Collaborative Approach for Caching Dynamic Data in Portal Applications
Portals are one of the rapidly growing applications on the Web, providing a single interface to access different sources (providers). Providing fast response time is one of the c...
Mehregan Mahdavi, John Shepherd, Boualem Benatalla...
HPDC
2012
IEEE
12 years 1 months ago
Work stealing and persistence-based load balancers for iterative overdecomposed applications
Applications often involve iterative execution of identical or slowly evolving calculations. Such applications require incremental rebalancing to improve load balance across itera...
Jonathan Lifflander, Sriram Krishnamoorthy, Laxmik...