Sciweavers

8135 search results - page 1457 / 1627
» network 2008
Sort
View
139
Voted
NSDI
2008
15 years 6 months ago
Designing and Implementing Malicious Hardware
Hidden malicious circuits provide an attacker with a stealthy attack vector. As they occupy a layer below the entire software stack, malicious circuits can bypass traditional defe...
Samuel T. King, Joseph Tucek, Anthony Cozzie, Chri...
GRID
2008
Springer
15 years 4 months ago
Rescheduling co-allocation requests based on flexible advance reservations and processor remapping
Large-scale computing environments, such as TeraGrid, Distributed ASCI Supercomputer (DAS), and Grid’5000, have been using resource co-allocation to execute applications on mult...
Marco Aurélio Stelmar Netto, Rajkumar Buyya
177
Voted
GRID
2008
Springer
15 years 3 months ago
Cost and accuracy sensitive dynamic workflow composition over grid environments
A myriad of recent activities can be seen towards dynamic workflow composition for processing complex and data intensive problems. Meanwhile, the simultaneous emergence of the gri...
David Chiu, Sagar Deshpande, Gagan Agrawal, Rongxi...
174
Voted
AH
2008
Springer
15 years 10 months ago
A Scrutable User Modelling Infrastructure for Enabling Life-Long User Modelling
User Modelling is the core component for the majority of personalisation systems. By keeping a model for every user, a system can successfully personalise its content and utilise a...
Demetris Kyriacou
ICDCS
2008
IEEE
15 years 10 months ago
stdchk: A Checkpoint Storage System for Desktop Grid Computing
— Checkpointing is an indispensable technique to provide fault tolerance for long-running high-throughput applications like those running on desktop grids. This paper argues that...
Samer Al-Kiswany, Matei Ripeanu, Sudharshan S. Vaz...
« Prev « First page 1457 / 1627 Last » Next »