Sciweavers

4196 search results - page 822 / 840
» Supporting the development of network programs
Sort
View
HPDC
1999
IEEE
13 years 12 months ago
Remote Application Scheduling on Metacomputing Systems
Efficient and robust metacomputing requires the decomposition of complex jobs into tasks that must be scheduled on distributed processing nodes. There are various ways of creating...
Heath A. James, Kenneth A. Hawick
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
13 years 12 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
HOTOS
1997
IEEE
13 years 12 months ago
The Flux OS Toolkit: Reusable Components for OS Implementation
To an unappreciated degree, research both in operating systems andtheirprogramminglanguageshasbeen severely hampered by the lack of cleanly reusable code providing mundanelow-leve...
Bryan Ford, Kevin Van Maren, Jay Lepreau, Stephen ...
CLUSTER
2007
IEEE
13 years 11 months ago
Identifying energy-efficient concurrency levels using machine learning
Abstract-- Multicore microprocessors have been largely motivated by the diminishing returns in performance and the increased power consumption of single-threaded ILP microprocessor...
Matthew Curtis-Maury, Karan Singh, Sally A. McKee,...
CODES
2007
IEEE
13 years 11 months ago
Influence of procedure cloning on WCET prediction
For the worst-case execution time (WCET) analysis, especially loops are an inherent source of unpredictability and loss of precision. This is caused by the difficulty to obtain sa...
Paul Lokuciejewski, Heiko Falk, Martin Schwarzer, ...