Sciweavers

1816 search results - page 303 / 364
» Trace oblivious computation
Sort
View
VC
2010
207views more  VC 2010»
13 years 7 months ago
Protrusion-oriented 3D mesh segmentation
Abstract In this paper, we present a segmentation algorithm which partitions a mesh based on the premise that a 3D object consists of a core body and its constituent protrusible pa...
Alexander Agathos, Ioannis Pratikakis, Stavros J. ...
WCRE
2010
IEEE
13 years 7 months ago
Reverse Engineering Self-Modifying Code: Unpacker Extraction
—An important application of binary-level reverse engineering is in reconstructing the internal logic of computer malware. Most malware code is distributed in encrypted (or “pa...
Saumya K. Debray, Jay Patel
CONCURRENCY
2010
95views more  CONCURRENCY 2010»
13 years 7 months ago
The Scalasca performance toolset architecture
SCALASCA is a performance toolset that has been specifically designed to analyze parallel application execution behavior on large-scale systems. It offers an incremental performan...
Markus Geimer, Felix Wolf, Brian J. N. Wylie, Erik...
TMA
2010
Springer
183views Management» more  TMA 2010»
13 years 6 months ago
Kiss to Abacus: A Comparison of P2P-TV Traffic Classifiers
In the last few years the research community has proposed several techniques for network traffic classification. While the performance of these methods is promising especially for ...
Alessandro Finamore, Michela Meo, Dario Rossi, Sil...
JCST
2010
128views more  JCST 2010»
13 years 3 months ago
Queue Waiting Time Aware Dynamic Workflow Scheduling in Multicluster Environments
Abstract Workflows are prevailing in scientific computation. Multicluster environments emerge and provide more resources, benefiting workflows but also challenging the traditional ...
Zhi-Feng Yu, Wei-Song Shi