Sciweavers

IPPS
2008
IEEE
14 years 6 months ago
Receiver-initiated message passing over RDMA Networks
Providing point-to-point messaging-passing semantics atop Put/Get hardware traditionally involves implementing a protocol comprising three network latencies. In this paper, we ana...
Scott Pakin
IPPS
2008
IEEE
14 years 6 months ago
SLA-based resource allocation in cluster computing systems
Resource allocation is a fundamental but challenging problem due to the complexity of cluster computing systems. In enterprise service computing, resource allocation is often asso...
Kaiqi Xiong, Harry G. Perros
IPPS
2008
IEEE
14 years 6 months ago
Formal modeling and analysis of real-time resource-sharing protocols in Real-Time Maude
This paper presents general techniques for formally modeling, simulating, and model checking real-time resource-sharing protocols in Real-Time Maude. The “scheduling subset” o...
Peter Csaba Ölveczky, Pavithra Prabhakar, Xue...
IPPS
2008
IEEE
14 years 6 months ago
An efficient, model-based CPU-GPU heterogeneous FFT library
Yasuhiko Ogata, Toshio Endo, Naoya Maruyama, Satos...
IPPS
2008
IEEE
14 years 6 months ago
Optimal spot-checking to minimize the computation time in volunteer computing
This paper proposes an optimization technique for spotchecking to minimize the computation time of volunteer computing (VC) systems with malicious participants who return erroneou...
Kan Watanabe, Masaru Fukushi, Susumu Horiguchi
IPPS
2008
IEEE
14 years 6 months ago
Modeling and analysis of power in multicore network processors
With the emergence of multicore network processors in support of high-performance computing and networking applications, power consumption has become a problem of increasing signi...
S. Huang, Y. Luo, W. Feng
IPPS
2008
IEEE
14 years 6 months ago
CoSL: A coordinated statistical learning approach to measuring the capacity of multi-tier websites
Website capacity determination is crucial to measurement-based access control, because it determines when to turn away excessive client requests to guarantee consistent service qu...
Jia Rao, Cheng-Zhong Xu
IPPS
2008
IEEE
14 years 6 months ago
Adaptive and dynamic intrusion detection by means of idiotypic networks paradigm
—In this paper we present a novel intrusion detection architecture based on Idiotypic Network Theory (INIDS), that aims at dealing with large scale network attacks featuring vari...
Marek Ostaszewski, Pascal Bouvry, Franciszek Sered...
IPPS
2008
IEEE
14 years 6 months ago
Outlier detection in performance data of parallel applications
— When an adaptive software component is employed to select the best-performing implementation for a communication operation at runtime, the correctness of the decision taken str...
Katharina Benkert, Edgar Gabriel, Michael M. Resch