Sciweavers

1816 search results - page 263 / 364
» Trace oblivious computation
Sort
View
ECRTS
2004
IEEE
14 years 16 days ago
Energy-Efficient Policies for Request-Driven Soft Real-Time Systems
Computing systems, ranging from small battery-operated embedded systems to more complex general purpose systems, are designed to satisfy various computation demands in some accept...
Cosmin Rusu, Ruibin Xu, Rami G. Melhem, Daniel Mos...
DSN
2006
IEEE
14 years 15 days ago
An Approach for Detecting and Distinguishing Errors versus Attacks in Sensor Networks
Distributed sensor networks are highly prone to accidental errors and malicious activities, owing to their limited resources and tight interaction with the environment. Yet only a...
Claudio Basile, Meeta Gupta, Zbigniew Kalbarczyk, ...
EUC
2006
Springer
14 years 14 days ago
A Lightweight IP Traceback Mechanism on IPv6
Due to the stateless nature of the internet, it is an intricate problem to determine the source of spoofed attacking packets. To handle this problem we utilize the IP traceback mec...
Syed Obaid Amin, Myung Soo Kang, Choong Seon Hong
IPPS
1995
IEEE
14 years 11 days ago
Characterizing parallel file-access patterns on a large-scale multiprocessor
High-performance parallel file systems are needed to satisfy tremendous I/O requirements of parallel scientific applications. The design of such high-performance parallel file ...
Apratim Purakayastha, Carla Schlatter Ellis, David...
DEBS
2010
ACM
14 years 4 days ago
Magnet: practical subscription clustering for Internet-scale publish/subscribe
An effective means for building Internet-scale distributed applications, and in particular those involving group-based information sharing, is to deploy peer-to-peer overlay netwo...
Sarunas Girdzijauskas, Gregory Chockler, Ymir Vigf...