Sciweavers

1816 search results - page 241 / 364
» Trace oblivious computation
Sort
View
ICCS
2009
Springer
14 years 3 months ago
A Holistic Approach for Performance Measurement and Analysis for Petascale Applications
Abstract. Contemporary high-end Terascale and Petascale systems are composed of hundreds of thousands of commodity multi-core processors interconnected with high-speed custom netwo...
Heike Jagode, Jack Dongarra, Sadaf R. Alam, Jeffre...
SPIN
2009
Springer
14 years 3 months ago
Identifying Modeling Errors in Signatures by Model Checking
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Sebastian Schmerl, Michael Vogel, Hartmut Kön...
TLCA
2009
Springer
14 years 3 months ago
Lexicographic Path Induction
Abstract. Programming languages theory is full of problems that reduce to proving the consistency of a logic, such as the normalization of typed lambda-calculi, the decidability of...
Jeffrey Sarnat, Carsten Schürmann
APSCC
2008
IEEE
14 years 3 months ago
Algorithms for Transmission Power Control in Biomedical Wireless Sensor Networks
—Wireless sensor networks are increasingly being used for continuous monitoring of patients with chronic health conditions such as diabetes and heart problems. As biomedical sens...
Ashay Dhamdhere, Vijay Sivaraman, Vidit Mathur, Sh...
DSN
2008
IEEE
14 years 3 months ago
Toward an understanding of the processing delay of peer-to-peer relay nodes
Abstract—Peer-to-peer relaying is commonly used in realtime applications to cope with NAT and firewall restrictions and provide better quality network paths. As relaying is not ...
Kuan-Ta Chen, Jing-Kai Lou