Sciweavers

750 search results - page 119 / 150
» Program Chair's Message
Sort
View
ICCS
2007
Springer
14 years 3 months ago
Universal Execution of Parallel Processes: Penetrating NATs over the Grid
Today, clusters are very important computing resources and many computing centers manage their clusters in private networks. But parallel programs may not work in private clusters....
Insoon Jo, Hyuck Han, Heon Young Yeom, Ohkyoung Kw...
ISESE
2006
IEEE
14 years 3 months ago
Identifying domain-specific defect classes using inspections and change history
We present an iterative, reading-based methodology for analyzing defects in source code when change history is available. Our bottom-up approach can be applied to build knowledge ...
Taiga Nakamura, Lorin Hochstein, Victor R. Basili
RTAS
2006
IEEE
14 years 3 months ago
Network-Code Machine: Programmable Real-Time Communication Schedules
Distributed hard real-time systems require guaranteed communication. One common approach is to restrict network access by enforcing a time-division multiple access (TDMA) schedule...
Sebastian Fischmeister, Oleg Sokolsky, Insup Lee
IPPS
2005
IEEE
14 years 2 months ago
User Transparent Parallel Processing of the 2004 NIST TRECVID Data Set
The Parallel-Horus framework, developed at the University of Amsterdam, is a unique software architecture that allows non-expert parallel programmers to develop fully sequential m...
Frank J. Seinstra, Cees Snoek, Dennis Koelma, Jan-...
ISCA
2005
IEEE
88views Hardware» more  ISCA 2005»
14 years 2 months ago
Architecture for Protecting Critical Secrets in Microprocessors
We propose “secret-protected (SP)” architecture to enable secure and convenient protection of critical secrets for a given user in an on-line environment. Keys are examples of...
Ruby B. Lee, Peter C. S. Kwan, John Patrick McGreg...