Sciweavers

43264 search results - page 8360 / 8653
» Comparing models of computation
Sort
View
SACMAT
2009
ACM
15 years 5 months ago
Analysis of virtual machine system policies
The recent emergence of mandatory access (MAC) enforcement for virtual machine monitors (VMMs) presents an opportunity to enforce a security goal over all its virtual machines (VM...
Sandra Rueda, Hayawardh Vijayakumar, Trent Jaeger
116
Voted
ANSS
2008
IEEE
15 years 5 months ago
Simulation of Buffer Management Policies in Networks for Grids
Grid technologies are emerging as the next generation of distributed computing, allowing the aggregation of resources that are geographically distributed across different location...
Agustín C. Caminero, Anthony Sulistio, Blan...
WIMOB
2008
IEEE
15 years 5 months ago
A Mechanism Design-Based Secure Architecture for Mobile Ad Hoc Networks
—To avoid the single point of failure for the certificate authority (CA) in MANET, a decentralized solution is proposed where nodes are grouped into different clusters. Each clu...
Abderrezak Rachedi, Abderrahim Benslimane, Hadi Ot...
IEEEPACT
2007
IEEE
15 years 5 months ago
Speculative Decoupled Software Pipelining
In recent years, microprocessor manufacturers have shifted their focus from single-core to multi-core processors. To avoid burdening programmers with the responsibility of paralle...
Neil Vachharajani, Ram Rangan, Easwaran Raman, Mat...
IEEEPACT
2007
IEEE
15 years 5 months ago
Performance Portable Optimizations for Loops Containing Communication Operations
Effective use of communication networks is critical to the performance and scalability of parallel applications. Partitioned Global Address Space languages like UPC bring the pro...
Costin Iancu, Wei Chen, Katherine A. Yelick
« Prev « First page 8360 / 8653 Last » Next »