Sciweavers

IPPS
2008
IEEE
13 years 11 months ago
Sweep coverage with mobile sensors
Many efforts have been made for addressing coverage problems in sensor networks. They fall into two categories, full coverage and barrier coverage, featured as static coverage. In...
Wei-Fang Cheng, Mo Li, Kebin Liu, Yunhao Liu, Xian...
IPPS
2008
IEEE
13 years 11 months ago
Impact of multicores on large-scale molecular dynamics simulations
Processing nodes of the Cray XT and IBM Blue Gene Massively Parallel Processing (MPP) systems are composed of multiple execution units, sharing memory and network subsystems. Thes...
Sadaf R. Alam, Pratul K. Agarwal, Scott S. Hampton...
IPPS
2008
IEEE
13 years 11 months ago
Model-guided performance tuning of parameter values: A case study with molecular dynamics visualization
In this paper, we consider the interaction between application programmers and tools that automatically search a space of application-level parameters that are believed to impact ...
Yiinju L. Nelson, Bhupesh Bansal, Mary W. Hall, Ai...
IPPS
2008
IEEE
13 years 11 months ago
A genetic programming approach to solve scheduling problems with parallel simulation
—Scheduling and dispatching are two ways of solving production planning problems. In this work, based on preceding works, it is explained how these two approaches can be combined...
Andreas Beham, Stephan M. Winkler, Stefan Wagner 0...
IPPS
2008
IEEE
13 years 11 months ago
Software monitoring with bounded overhead
In this paper, we introduce the new technique of HighConfidence Software Monitoring (HCSM), which allows one to perform software monitoring with bounded overhead and concomitantl...
Sean Callanan, David J. Dean, Michael Gorbovitski,...
IPPS
2008
IEEE
13 years 11 months ago
Self-stabilizing population of mobile agents
We investigate a problem of maintaining a target population of mobile agents in a distributed system. The purpose of the agents is to perform certain activities, so the goal is to...
Zbigniew Golebiewski, Miroslaw Kutylowski, Tomasz ...
IPPS
2008
IEEE
13 years 11 months ago
What is the best way to prove a cryptographic protocol correct?
In this paper, we identify that protocol verification using invariants have significant limitations such as inapplicability to some protocols, non-standard attacker inferences a...
Sreekanth Malladi, Gurdeep S. Hura
IPPS
2008
IEEE
13 years 11 months ago
Resource allocation in a client/server hybrid network for virtual world environments
The creation of a virtual world environment (VWE) has significant costs, such as maintenance of server rooms, server administration, and customer service. The initial development...
Luis Diego Briceno, Howard Jay Siegel, Anthony A. ...
IPPS
2008
IEEE
13 years 11 months ago
DC-SIMD : Dynamic communication for SIMD processors
SIMD (single instruction multiple data)-type processors have been found very efficient in image processing applications, because their repetitive structure is able to exploit the...
Raymond Frijns, Hamed Fatemi, Bart Mesman, Henk Co...
IPPS
2008
IEEE
13 years 11 months ago
A hash-TLB approach for MMU virtualization in xen/IA64
Xiantao Zhang, Anthony X. F. Xu, Qi Li, David K. Y...