Sciweavers

8655 search results - page 1188 / 1731
» Challenges for Trusted Computing
Sort
View
NEW2AN
2010
Springer
15 years 3 months ago
Heuristic Congestion Control for Message Deletion in Delay Tolerant Network
Delay tolerant network (DTN) challenges on large delay of communication, opportunistic and intermittent connectivity so that data can be transferred over vulnerable network. Most r...
Lertluck Leela-amornsin, Hiroshi Esaki
PVM
2010
Springer
15 years 3 months ago
Enabling Concurrent Multithreaded MPI Communication on Multicore Petascale Systems
With the ever-increasing numbers of cores per node on HPC systems, applications are increasingly using threads to exploit the shared memory within a node, combined with MPI across ...
Gábor Dózsa, Sameer Kumar, Pavan Bal...
RAID
2010
Springer
15 years 3 months ago
Behavior-Based Worm Detectors Compared
Abstract. Many worm detectors have been proposed and are being deployed, but the literature does not clearly indicate which one is the best. New worms such as IKEE.B (also known as...
Shad Stafford, Jun Li
RAID
2010
Springer
15 years 3 months ago
Anomaly Detection and Mitigation for Disaster Area Networks
Abstract. One of the most challenging applications of wireless networking are in disaster area networks where lack of infrastructure, limited energy resources, need for common oper...
Jordi Cucurull, Mikael Asplund, Simin Nadjm-Tehran...
138
Voted
SPE
2010
114views more  SPE 2010»
15 years 3 months ago
A survey of the research on power management techniques for high-performance systems
This paper surveys the research on power management techniques for high performance systems. These include both commercial high performance clusters and scientific high performanc...
Yongpeng Liu, Hong Zhu
« Prev « First page 1188 / 1731 Last » Next »