Sciweavers

1558 search results - page 13 / 312
» Scalable work stealing
Sort
View
CHI
2009
ACM
14 years 4 months ago
Vibrapass: secure authentication based on shared lies
Authentication in public spaces is a risky task. Frauds on cash machines (ATMs) are not uncommon nowadays. The biggest group of attacks is observation attacks, which focus on reco...
Alexander De Luca, Emanuel von Zezschwitz, Heinric...
IEEEPACT
2009
IEEE
14 years 4 months ago
Analytical Modeling of Pipeline Parallelism
Parallel programming is a requirement in the multi-core era. One of the most promising techniques to make parallel programming available for the general users is the use of parall...
Angeles G. Navarro, Rafael Asenjo, Siham Tabik, Ca...
SPAA
2005
ACM
14 years 3 months ago
Dynamic circular work-stealing deque
The non-blocking work-stealing algorithm of Arora, Blumofe, and Plaxton (henceforth ABP work-stealing) is on its way to becoming the multiprocessor load balancing technology of ch...
David Chase, Yossi Lev
ICCS
2007
Springer
14 years 1 months ago
Unusual Event Recognition for Mobile Alarm System
This paper proposes an unusual event recognition algorithm, which is a part of a mobile alarm system. Our systems focus on unusual event. When the system detects the unusual event,...
Soo Yeong Kwak, Guntae Bae, Kil-Cheon Kim, Hyeran ...
ESORICS
2006
Springer
14 years 1 months ago
SessionSafe: Implementing XSS Immune Session Handling
With the growing trend towards the use of web applications the danger posed by cross site scripting vulnerabilities gains severity. The most serious threats resulting from cross si...
Martin Johns