Sciweavers

2302 search results - page 22 / 461
» Privacy-preserving Distributed Clustering using Generative M...
Sort
View
FIDJI
2003
Springer
14 years 18 days ago
Model Generation for Distributed Java Programs
— We present techniques for analyzing the source code of distributed Java applications, and building finite models of their behaviour. The models are labelled transition systems...
Rabéa Boulifa, Eric Madelaine
ISSS
1996
IEEE
134views Hardware» more  ISSS 1996»
13 years 11 months ago
ADOPT: Efficient Hardware Address Generation in Distributed Memory Architectures
An address generation and optimization environment (ADOPT) for distributed memory architectures, is presented. ADOPT is oriented to minimize the area overhead introduced by the us...
Miguel Miranda, Francky Catthoor, Martin Janssen, ...
PPOPP
2009
ACM
14 years 8 months ago
Software transactional distributed shared memory
We have developed a transaction-based approach to distributed shared memory(DSM) that supports object caching and generates path expression prefetches. A path expression specifies...
Alokika Dash, Brian Demsky
GRC
2007
IEEE
14 years 1 months ago
Towards Mobile Internet: Location Privacy Threats and Granular Computation Challenges
The bulk of contents out on the Internet continue to grow at an astounding pace. As computing and communications become ubiquitous, we are entering the Mobile Internet Computing e...
Ling Liu
IMCSIT
2010
13 years 5 months ago
Modelling, Optimization and Execution of Workflow Applications with Data Distribution, Service Selection and Budget Constraints
Abstract--The paper proposes a model which allows integration of services published by independent providers into scientific or business workflows. Optimization algorithms are prop...
Pawel Czarnul