Sciweavers

1266 search results - page 224 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
IPPS
2005
IEEE
14 years 2 months ago
Connection-less TCP
TCP is an important protocol in high-performance computing. It is used extensively in graphics programs and file systems and it is often the protocol used for the cluster control...
Patricia Gilfeather, Arthur B. Maccabe
EUROPAR
2009
Springer
14 years 3 months ago
MPI Applications on Grids: A Topology Aware Approach
Porting on grids complex MPI applications involving collective communications requires significant program modification, usually dedicated to a single grid structure. The diffi...
Camille Coti, Thomas Hérault, Franck Cappel...
ICPPW
2006
IEEE
14 years 2 months ago
Dynamic Algorithm Selection in Parallel GAMESS Calculations
Applications augmented with adaptive capabilities are becoming common in parallel computing environments which share resources such as main memory, network, or disk I/O. For large...
Nurzhan Ustemirov, Masha Sosonkina, Mark S. Gordon...
IMC
2006
ACM
14 years 2 months ago
Malware prevalence in the KaZaA file-sharing network
In recent years, more than 200 viruses have been reported to use a peer-to-peer (P2P) file-sharing network as a propagation vector. Disguised as files that are frequently exchan...
Seungwon Shin, Jaeyeon Jung, Hari Balakrishnan
ICIP
2007
IEEE
14 years 2 months ago
Quality-Aware Video
Recent development in network visual communications has emphasized on the need of objective, reliable and easy-to-use video quality assessment (VQA) systems. This paper introduces...
Basavaraj Hiremath, Qiang Li, Zhou Wang