Sciweavers

3112 search results - page 132 / 623
» Cluster Computing White Paper
Sort
View
AUSFORENSICS
2004
15 years 5 months ago
An Analysis and Comparison of Clustered Password Crackers
Password policies alone do not stand a chance of securing computer systems which rely on the use of secretbased, password authentication methods. The enforcement of "strong&q...
Christian Frichot
ICPR
2008
IEEE
15 years 10 months ago
A study of change detection from satellite images using joint intensity histogram
Detection of appearance/disappearance of objects from satellite images is generally very difficult since background pixels also change their intensity values owing to various fac...
Yasuyo Kita
125
Voted
CCGRID
2007
IEEE
15 years 10 months ago
Standardization of an API for Distributed Resource Management Systems
Today’s cluster and grid environments demand the usage of product-specific APIs and tools for developing distributed applications. We give an overview of the Distributed Resour...
Peter Tröger, Hrabri Rajic, Andreas Haas, Pio...
114
Voted
CLUSTER
2006
IEEE
15 years 9 months ago
FAIL-MPI: How Fault-Tolerant Is Fault-Tolerant MPI?
One of the topics of paramount importance in the development of Cluster and Grid middleware is the impact of faults since their occurrence in Grid infrastructures and in large-sca...
William Hoarau, Pierre Lemarinier, Thomas Hé...
100
Voted
CCGRID
2005
IEEE
15 years 9 months ago
Experiences with the KOALA co-allocating scheduler in multiclusters
In multicluster systems, and more generally, in grids, jobs may require co-allocation, i.e., the simultaneous allocation of resources such as processors and input files in multip...
Hashim H. Mohamed, Dick H. J. Epema