Sciweavers

31387 search results - page 6203 / 6278
» Abstracts
Sort
View
151
Voted
IPPS
2010
IEEE
15 years 19 days ago
Designing high-performance and resilient message passing on InfiniBand
Abstract--Clusters featuring the InfiniBand interconnect are continuing to scale. As an example, the "Ranger" system at the Texas Advanced Computing Center (TACC) include...
Matthew J. Koop, Pavel Shamis, Ishai Rabinovitz, D...
157
Voted
IPPS
2010
IEEE
15 years 19 days ago
Runtime checking of serializability in software transactional memory
Abstract--Ensuring the correctness of complex implementations of software transactional memory (STM) is a daunting task. Attempts have been made to formally verify STMs, but these ...
Arnab Sinha, Sharad Malik
BIRTHDAY
2010
Springer
15 years 3 days ago
Quantitative Simulation Games
Abstract. Classical formalizations of systems and properties are boolean: given a system and a property, the property is either true or false of the system. The classical view part...
Pavol Cerný, Thomas A. Henzinger, Arjun Rad...
CORR
2010
Springer
177views Education» more  CORR 2010»
15 years 2 days ago
AntiJam: Efficient Medium Access despite Adaptive and Reactive Jamming
Abstract--Intentional interference constitutes a major threat for communication networks operating over a shared medium where availability is imperative. Jamming attacks are often ...
Andréa W. Richa, Christian Scheideler, Stef...
151
Voted
DBSEC
2010
196views Database» more  DBSEC 2010»
15 years 2 days ago
Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance
Abstract. This paper describes how to preserve integrity and confidentiality of a directed acyclic graph (DAG) model of provenance database. We show a method to preserve integrity ...
Amril Syalim, Takashi Nishide, Kouichi Sakurai
« Prev « First page 6203 / 6278 Last » Next »