Sciweavers

785 search results - page 124 / 157
» Two remarks on remotality
Sort
View
DCOSS
2006
Springer
14 years 1 months ago
Agimone: Middleware Support for Seamless Integration of Sensor and IP Networks
The scope of wireless sensor network (WSN) applications has traditionally been restricted by physical sensor coverage and limited computational power. Meanwhile, IP networks like t...
Gregory Hackmann, Chien-Liang Fok, Gruia-Catalin R...
HICSS
2000
IEEE
124views Biometrics» more  HICSS 2000»
14 years 1 months ago
An Empirical Study of Distribution based on Voyager: A Performance Analysis
The paper describes the model, implementation and experimental evaluation of a distributed Kohonen Neural Network application (Kohonen Application). The aim of this research is to...
Sérgio Viademonte, Frada Burstein, Fá...
ISCA
1998
IEEE
114views Hardware» more  ISCA 1998»
14 years 1 months ago
Tempest and Typhoon: User-Level Shared Memory
Future parallel computers must efficiently execute not only hand-coded applications but also programs written in high-level, parallel programming languages. Today's machines ...
Steven K. Reinhardt, James R. Larus, David A. Wood
ASPLOS
1991
ACM
14 years 1 months ago
NUMA Policies and Their Relation to Memory Architecture
Multiprocessor memory reference traces provide a wealth of information on the behavior of parallel programs. We have used this information to explore the relationship between kern...
William J. Bolosky, Michael L. Scott, Robert P. Fi...
NSDI
2008
14 years 14 days ago
Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm
Botnets, i.e., networks of compromised machines under a common control infrastructure, are commonly controlled by an attacker with the help of a central server: all compromised ma...
Thorsten Holz, Moritz Steiner, Frederic Dahl, Erns...