Sciweavers

16206 search results - page 3217 / 3242
» At Issue
Sort
View
CLUSTER
2010
IEEE
14 years 1 months ago
Middleware support for many-task computing
Many-task computing aims to bridge the gap between two computing paradigms, high throughput computing and high performance computing. Many-task computing denotes highperformance co...
Ioan Raicu, Ian T. Foster, Mike Wilde, Zhao Zhang,...
ACL
2011
14 years 1 months ago
They Can Help: Using Crowdsourcing to Improve the Evaluation of Grammatical Error Detection Systems
Despite the rising interest in developing grammatical error detection systems for non-native speakers of English, progress in the field has been hampered by a lack of informative...
Nitin Madnani, Martin Chodorow, Joel R. Tetreault,...
ACNS
2011
Springer
241views Cryptology» more  ACNS 2011»
14 years 1 months ago
Misuse Detection in Consent-Based Networks
Consent-based networking, which requires senders to have permission to send traffic, can protect against multiple attacks on the network. Highly dynamic networks like Mobile Ad-hoc...
Mansoor Alicherry, Angelos D. Keromytis
ASPLOS
2011
ACM
14 years 1 months ago
Pocket cloudlets
Cloud services accessed through mobile devices suffer from high network access latencies and are constrained by energy budgets dictated by the devices’ batteries. Radio and batt...
Emmanouil Koukoumidis, Dimitrios Lymberopoulos, Ka...
ASPLOS
2011
ACM
14 years 1 months ago
ConSeq: detecting concurrency bugs through sequential errors
Concurrency bugs are caused by non-deterministic interleavings between shared memory accesses. Their effects propagate through data and control dependences until they cause softwa...
Wei Zhang, Junghee Lim, Ramya Olichandran, Joel Sc...
« Prev « First page 3217 / 3242 Last » Next »