Sciweavers

4311 search results - page 497 / 863
» Code Generation for Distributed Systems
Sort
View
97
Voted
IPPS
2006
IEEE
15 years 7 months ago
Network intrusion detection with semantics-aware capability
Malicious network traffic, including widespread worm activity, is a growing threat to Internet-connected networks and hosts. In this paper, we propose a network intrusion detectio...
Walter J. Scheirer, Mooi Choo Chuah
126
Voted
IPPS
2005
IEEE
15 years 6 months ago
Automated Analysis of Memory Access Behavior
Abstract— We developed an automated environment to measure the memory access behavior of applications on high performance clusters. Code optimization for processor caches is cruc...
Michael Gerndt, Tianchao Li
76
Voted
SAC
2005
ACM
15 years 6 months ago
Adaptation point analysis for computation migration/checkpointing
Finding the appropriate location of adaptation points for computation migration/checkpointing is critical since the distance between two consecutive adaptation points determines t...
Yanqing Ji, Hai Jiang, Vipin Chaudhary
119
Voted
ICCS
2004
Springer
15 years 6 months ago
Agent-Based Simulation of Data-Driven Fire Propagation Dynamics
Real world problems such as fire propagation prediction, can often be considered as a compositional combination of multiple, simple but coupled subproblems corresponding to analyt...
John Michopoulos, Panagiota Tsompanopoulou, Elias ...
107
Voted
MOMM
2009
ACM
129views Communications» more  MOMM 2009»
15 years 5 months ago
Sharing large data collections between mobile peers
New directions in the provision of end-user computing experiences mean that we need to determine the best way to share data between small mobile computing devices. Partitioning la...
Brian Tripney, Christopher Foley, Richard Gourlay,...