Sciweavers

280 search results - page 39 / 56
» Vulnerability Discovery Modeling Using Weibull Distribution
Sort
View
IPPS
2008
IEEE
14 years 2 months ago
Translational research design templates, Grid computing, and HPC
Design templates that involve discovery, analysis, and integration of information resources commonly occur in many scientific research projects. In this paper we present examples o...
Joel H. Saltz, Scott Oster, Shannon Hastings, Step...
ACSC
2005
IEEE
14 years 1 months ago
Auction Based Resource Negotiation in NOMAD
The challenges faced by mobile and distributed applications include the ability to discover and negotiate for the resources required for execution. The NOMAD (Negotiated Object Mo...
Kris Bubendorfer, John H. Hine
UAI
2008
13 years 9 months ago
CT-NOR: Representing and Reasoning About Events in Continuous Time
We present a generative model for representing and reasoning about the relationships among events in continuous time. We apply the model to the domain of networked and distributed...
Aleksandr Simma, Moisés Goldszmidt, John Ma...
IEEEPACT
2008
IEEE
14 years 2 months ago
Characterizing and modeling the behavior of context switch misses
One of the essential features in modern computer systems is context switching, which allows multiple threads of execution to time-share a limited number of processors. While very ...
Fang Liu, Fei Guo, Yan Solihin, Seongbeom Kim, Abd...
CCS
2007
ACM
14 years 1 months ago
Non-volatile memory and disks: avenues for policy architectures
As computing models change, so too do the demands on storage. Distributed and virtualized systems introduce new vulnerabilities, assumptions, and performance requirements on disks...
Kevin R. B. Butler, Stephen E. McLaughlin, Patrick...