Sciweavers

8503 search results - page 1556 / 1701
» Secure Software Architectures
Sort
View
IPSN
2004
Springer
14 years 2 months ago
Modeling of sensor nets in Ptolemy II
This paper describes a modeling and simulation framework called VisualSense for wireless sensor networks that builds on and leverages Ptolemy II. This framework supports actor-ori...
Philip Baldwin, Sanjeev Kohli, Edward A. Lee, Xiao...
MDAFA
2004
Springer
116views Hardware» more  MDAFA 2004»
14 years 2 months ago
"Weaving" MTL Model Transformations
Model transformations are the core of the MDA approach to software development. As specified by the OMG, model transformations should act on any kind of model of any kind of metamo...
Raul Silaghi, Frédéric Fondement, Al...
PVM
2004
Springer
14 years 2 months ago
Open MPI: Goals, Concept, and Design of a Next Generation MPI Implementation
Abstract. A large number of MPI implementations are currently available, each of which emphasize different aspects of high-performance computing or are intended to solve a speci...
Edgar Gabriel, Graham E. Fagg, George Bosilca, Tha...
CCGRID
2003
IEEE
14 years 2 months ago
An Exposed Approach to Reliable Multicast in Heterogeneous Logistical Networks
An exposed approach in computer service architecture is one that offers client software a primitive service whose semantics are closely based on the underlying physical infrastruc...
Micah Beck, Ying Ding 0002, Erika Fuentes, Sharmil...
CLUSTER
2003
IEEE
14 years 2 months ago
From Clusters to the Fabric: The Job Management Perspective
Clusters provide an outstanding cost/performance ratio, but their efficient orchestration, i.e. their cooperative management, maintenance, and use, still poses difficulties. Mor...
Thomas Röblitz, Florian Schintke, Alexander R...
« Prev « First page 1556 / 1701 Last » Next »