Sciweavers

24 search results - page 4 / 5
» Adapting and Evaluating Commercial Workflow Engines for e-Sc...
Sort
View
ISSTA
2004
ACM
13 years 11 months ago
Testing malware detectors
In today’s interconnected world, malware, such as worms and viruses, can cause havoc. A malware detector (commonly known as virus scanner) attempts to identify malware. In spite...
Mihai Christodorescu, Somesh Jha
VMV
2003
99views Visualization» more  VMV 2003»
13 years 6 months ago
Resampling of Large Datasets for Industrial Flow Visualization
Many industrial flow simulations calculated in the car development process are defined on unstructured grids. However, visualization of unstructured grids is computationally exp...
Simon Stegmaier, Martin Schulz, Thomas Ertl
EUROSYS
2011
ACM
12 years 9 months ago
CloneCloud: elastic execution between mobile device and cloud
Mobile applications are becoming increasingly ubiquitous and provide ever richer functionality on mobile devices. At the same time, such devices often enjoy strong connectivity wi...
Byung-Gon Chun, Sunghwan Ihm, Petros Maniatis, May...
CGO
2010
IEEE
14 years 12 days ago
Automatic creation of tile size selection models
Tiling is a widely used loop transformation for exposing/exploiting parallelism and data locality. Effective use of tiling requires selection and tuning of the tile sizes. This is...
Tomofumi Yuki, Lakshminarayanan Renganarayanan, Sa...
EUROSYS
2006
ACM
14 years 2 months ago
Database replication policies for dynamic content applications
The database tier of dynamic content servers at large Internet sites is typically hosted on centralized and expensive hardware. Recently, research prototypes have proposed using d...
Gokul Soundararajan, Cristiana Amza, Ashvin Goel