Sciweavers

312 search results - page 10 / 63
» Performance of an MPI-IO Implementation Using Third-Party Tr...
Sort
View
SICHERHEIT
2010
13 years 5 months ago
State Transfer for Hypervisor-Based Proactive Recovery of Heterogeneous Replicated Services
Intrusion-tolerant replication enables the construction of systems that tolerate a finite number of malicious faults. An arbitrary number of faults can be tolerated during system ...
Tobias Distler, Rüdiger Kapitza, Hans P. Reis...
BMCBI
2010
118views more  BMCBI 2010»
13 years 7 months ago
Detecting lateral gene transfers by statistical reconciliation of phylogenetic forests
Background: To understand the evolutionary role of Lateral Gene Transfer (LGT), accurate methods are needed to identify transferred genes and infer their timing of acquisition. Ph...
Sophie S. Abby, Eric Tannier, Manolo Gouy, Vincent...
KDD
2012
ACM
220views Data Mining» more  KDD 2012»
11 years 10 months ago
ComSoc: adaptive transfer of user behaviors over composite social network
Accurate prediction of user behaviors is important for many social media applications, including social marketing, personalization and recommendation, etc. A major challenge lies ...
ErHeng Zhong, Wei Fan, Junwei Wang, Lei Xiao, Yong...
CORR
2010
Springer
135views Education» more  CORR 2010»
13 years 7 months ago
Gravitational tree-code on graphics processing units: implementation in CUDA
We present a new very fast tree-code which runs on massively parallel Graphical Processing Units (GPU) with NVIDIA CUDA architecture. The tree-construction and calculation of mult...
Evghenii Gaburov, Jeroen Bédorf, Simon Port...
SAINT
2002
IEEE
14 years 15 days ago
Implementation and Evaluation of Authorized Access LAN Sockets Using PPPoE
This paper presents an integrated method to achieve authorized access on LAN sockets in a campus network. The key issues of our method are user authentication and user tracking. W...
Hideo Masuda, Michio Nakanishi, Masahide Nakamura,...