Sciweavers

2941 search results - page 264 / 589
» Communication Performance Issues for Two Cluster Computers
Sort
View

Publication
518views
17 years 4 months ago
Procurement of Global Logistics Services Using Combinatorial Auction
Global logistics flows have increased dramatically in recent years due to the globalization in the world economy. It is more complex than the domestic logistics, consisting of mult...
Nikesh Kumar Srivastava, N. Viswanadham, and S. Ka...
INFOCOM
2002
IEEE
15 years 9 months ago
KNITS: Switch-based Connection Hand-off
—This paper describes a mechanism allowing nodes to hand-off active connections by utilizing connection splicing at an edge-switch serving as a gateway to a server cluster. The m...
Eric Van Hensbergen, Athanasios E. Papathanasiou
CLUSTER
2004
IEEE
15 years 8 months ago
FTC-Charm++: an in-memory checkpoint-based fault tolerant runtime for Charm++ and MPI
As high performance clusters continue to grow in size, the mean time between failure shrinks. Thus, the issues of fault tolerance and reliability are becoming one of the challengi...
Gengbin Zheng, Lixia Shi, Laxmikant V. Kalé
113
Voted
ITICSE
2006
ACM
15 years 10 months ago
ASSISTing CS1 students to learn: learning approaches and object-oriented programming
Identifying and managing students who experience difficulty with learning to program is a challenge for CS educators. In an attempt to answer the familiar question “What makes f...
Janet Hughes, D. Ramanee Peiris
136
Voted
STOC
2005
ACM
112views Algorithms» more  STOC 2005»
16 years 5 months ago
Covert two-party computation
We introduce the novel concept of covert two-party computation. Whereas ordinary secure two-party computation only guarantees that no more knowledge is leaked about the inputs of t...
Luis von Ahn, Nicholas J. Hopper, John Langford