Sciweavers

ISCAPDCS
2001
14 years 28 days ago
End-user Tools for Application Performance Analysis Using Hardware Counters
One purpose of the end-user tools described in this paper is to give users a graphical representation of performance information that has been gathered by instrumenting an applica...
Kevin S. London, Jack Dongarra, Shirley Moore, Phi...
ISCAPDCS
2001
14 years 28 days ago
Branch Prediction of Conditional Nested Loops through an Address Queue
-Multi-dimensional applications, such as image processing and seismic analysis, usually require the optimized performance obtained from instruction-level parallelism. The critical ...
Zhigang Jin, Nelson L. Passos, Virgil Andronache
ISCAPDCS
2001
14 years 28 days ago
Optimal Broadcasting in Injured Hypercubes Using Directed Safety Levels
Reliable communication in injured hypercubes with faulty links/nodes using directed safety levels is studied in this paper. In this approach, each node u in an n-dimensional hyper...
Jie Wu
ISCAPDCS
2004
14 years 28 days ago
A Reputation-based Trust Management in Peer-to-Peer Network Systems
Peer-to-peer networks have gained a lot of attention over the last couple of years, mainly due to the popularity of the free multimedia file-sharing program Napster and a legal ba...
Natalia Stakhanova, Sergio Ferrero, Johnny S. Wong...
ISCAPDCS
2004
14 years 28 days ago
Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures
Distributed Denial of Service (DDoS) attacks have become a large problem for users of computer systems connected to the Internet. DDoS attackers hijack secondary victim systems us...
Stephen M. Specht, Ruby B. Lee
ISCAPDCS
2004
14 years 28 days ago
A New Multicast Queuing Mechanism for High-Speed Packet Switches
Increasing multimedia applications such as teleconferencing and video-on-demand require the Internet to effectively provide high-performance multicast support. One of the promisin...
Min Song, Sachin Shetty, Mansoor Alam, HouJun Yang
ISCAPDCS
2004
14 years 28 days ago
An Adaptive OpenMP Loop Scheduler for Hyperthreaded SMPs
Hyperthreaded(HT) and simultaneous multithreaded (SMT) processors are now available in commodity workstations and servers. This technology is designed to increase throughput by ex...
Yun Zhang, Mihai Burcea, Victor Cheng, Ron Ho, Mic...
ISCAPDCS
2004
14 years 28 days ago
Semantic Encryption Transformation Scheme
We present a scheme to protect mobile code from malicious hosts. We propose a transformation scheme that changes the semantics of a program using pseudorandom I/O scrambling, cond...
Willard Thompson, Alec Yasinsac, J. Todd McDonald
ISCAPDCS
2004
14 years 28 days ago
Pushmepullyou: The Reality of Interaction with Shared Objects in Networked Walk-in Displays
This paper investigates the reality of shared manipulation of objects between users in distributed walkin displays and presents solutions to address the effects of constraints of ...
David J. Roberts, Oliver Otto, Robin Wolff
ISCAPDCS
2004
14 years 28 days ago
Detecting Grid-Abuse Attacks by Source-based Monitoring
While it provides the unprecedented processing power to solve many large scale computational problems, GRID, if abused, has the potential to easily be used to launch (for instance...
Jianjia Wu, Dan Cheng, Wei Zhao