Sciweavers

1397 search results - page 88 / 280
» Application Performance of a Linux Cluster Using Converse
Sort
View
PADS
2005
ACM
15 years 3 months ago
Parallel Event-Driven Neural Network Simulations Using the Hodgkin-Huxley Neuron Model
Neural systems are composed of a large number of highly-connected neurons and are widely simulated within the neurological community. In this paper, we examine the application of ...
Collin J. Lobb, Zenas Chao, Richard M. Fujimoto, S...
SIGMETRICS
2010
ACM
160views Hardware» more  SIGMETRICS 2010»
15 years 2 months ago
RSIO: automatic user interaction detection and scheduling
We present RSIO, a processor scheduling framework for improving the response time of latency-sensitive applications by monitoring accesses to I/O channels and inferring when user ...
Haoqiang Zheng, Jason Nieh
USENIX
2000
14 years 11 months ago
Dynamic Function Placement for Data-Intensive Cluster Computing
Optimally partitioning application and filesystem functionality within a cluster of clients and servers is a difficult problem due to dynamic variations in application behavior, r...
Khalil Amiri, David Petrou, Gregory R. Ganger, Gar...
JSAC
2006
93views more  JSAC 2006»
14 years 9 months ago
Intrusion Detection Routers: Design, Implementation and Evaluation Using an Experimental Testbed
Abstract--In this paper, we present the design, the implementation details, and the evaluation results of an intrusion detection and defense system for distributed denial-of-servic...
Eric Y. K. Chan, H. W. Chan, K. M. Chan, Vivien P....
OTM
2005
Springer
15 years 3 months ago
Distributed Authentication in GRID5000
Abstract. Between high-performance clusters and grids appears an intermediate infrastructure called cluster grid that corresponds to the interconnection of clusters through the Int...
Sébastien Varrette, Sebastien Georget, Joha...