Sciweavers

152 search results - page 31 / 31
» Finding Consistent Clusters in Data Partitions
Sort
View
CORR
2008
Springer
98views Education» more  CORR 2008»
13 years 5 months ago
An Information-Theoretical View of Network-Aware Malware Attacks
This work investigates three aspects: (a) a network vulnerability as the non-uniform vulnerable-host distribution, (b) threats, i.e., intelligent malwares that exploit such a vulne...
Zesheng Chen, Chuanyi Ji
CJ
1999
87views more  CJ 1999»
13 years 4 months ago
Evolution-Based Scheduling of Computations and Communications on Distributed Memory Multicomputers
We present a compiler optimization approach that uses the simulated evolution (SE) paradigm to enhance the finish time of heuristically scheduled computations with communication t...
Mayez A. Al-Mouhamed