Sciweavers

1816 search results - page 263 / 364
» Trace oblivious computation
Sort
View
ECRTS
2004
IEEE
15 years 6 months ago
Energy-Efficient Policies for Request-Driven Soft Real-Time Systems
Computing systems, ranging from small battery-operated embedded systems to more complex general purpose systems, are designed to satisfy various computation demands in some accept...
Cosmin Rusu, Ruibin Xu, Rami G. Melhem, Daniel Mos...
DSN
2006
IEEE
15 years 6 months ago
An Approach for Detecting and Distinguishing Errors versus Attacks in Sensor Networks
Distributed sensor networks are highly prone to accidental errors and malicious activities, owing to their limited resources and tight interaction with the environment. Yet only a...
Claudio Basile, Meeta Gupta, Zbigniew Kalbarczyk, ...
EUC
2006
Springer
15 years 6 months ago
A Lightweight IP Traceback Mechanism on IPv6
Due to the stateless nature of the internet, it is an intricate problem to determine the source of spoofed attacking packets. To handle this problem we utilize the IP traceback mec...
Syed Obaid Amin, Myung Soo Kang, Choong Seon Hong
IPPS
1995
IEEE
15 years 6 months ago
Characterizing parallel file-access patterns on a large-scale multiprocessor
High-performance parallel file systems are needed to satisfy tremendous I/O requirements of parallel scientific applications. The design of such high-performance parallel file ...
Apratim Purakayastha, Carla Schlatter Ellis, David...
DEBS
2010
ACM
15 years 6 months ago
Magnet: practical subscription clustering for Internet-scale publish/subscribe
An effective means for building Internet-scale distributed applications, and in particular those involving group-based information sharing, is to deploy peer-to-peer overlay netwo...
Sarunas Girdzijauskas, Gregory Chockler, Ymir Vigf...