Sciweavers

1383 search results - page 147 / 277
» Computational Mechanisms for Distributed Requirements Engine...
Sort
View
IPPS
2000
IEEE
15 years 9 months ago
Applying Interposition Techniques for Performance Analysis of OpenMP Parallel Applications
Tuning parallel applications requires the use of effective tools for detecting performance bottlenecks. Along a parallel program execution, many individual situations of performan...
Marc González, Albert Serra, Xavier Martore...
CANS
2008
Springer
103views Cryptology» more  CANS 2008»
15 years 7 months ago
A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks
Abstract. Wireless sensors are low power devices which are highly constrained in terms of computational capabilities, memory, and communication bandwidth. While battery life is the...
David Galindo, Rodrigo Roman, Javier Lopez
DCOSS
2011
Springer
14 years 4 months ago
Link quality ranking: Getting the best out of unreliable links
—Link quality estimation has been an active area of research within the wireless sensor network community. It is now well known that the estimation of reliable links requires few...
Marco Zuniga, Izabela Irzynska, Jan-Hinrich Hauer,...
PPOPP
2009
ACM
16 years 5 months ago
Safe open-nested transactions through ownership
Researchers in transactional memory (TM) have proposed open nesting as a methodology for increasing the concurrency of transactional programs. The idea is to ignore "low-leve...
Kunal Agrawal, I.-Ting Angelina Lee, Jim Sukha
HPDC
2008
IEEE
15 years 11 months ago
XenLoop: a transparent high performance inter-vm network loopback
Advances in virtualization technology have focused mainly on strengthening the isolation barrier between virtual machines (VMs) that are co-resident within a single physical machi...
Jian Wang, Kwame-Lante Wright, Kartik Gopalan