Sciweavers

5948 search results - page 308 / 1190
» Computing Robust Counter-Strategies
Sort
View
136
Voted
INDIASE
2009
ACM
15 years 11 months ago
Computing dynamic clusters
When trying to reverse engineer software, execution trace analysis is increasingly used. Though, by using this technique we are quickly faced with an enormous amount of data that ...
Philippe Dugerdil, Sebastien Jossi
SC
2005
ACM
15 years 10 months ago
PerfExplorer: A Performance Data Mining Framework For Large-Scale Parallel Computing
Parallel applications running on high-end computer systems manifest a complexity of performance phenomena. Tools to observe parallel performance attempt to capture these phenomena...
Kevin A. Huck, Allen D. Malony
DSOM
2005
Springer
15 years 10 months ago
Decentralized Computation of Threshold Crossing Alerts
Threshold crossing alerts (TCAs) indicate to a management system that a management variable, associated with the state, performance or health of the network, has crossed a certain ...
Fetahi Wuhib, Mads Dam, Rolf Stadler, Alexander Cl...
PDCAT
2005
Springer
15 years 10 months ago
Trusted Computing-Based Security Architecture For 4G Mobile Networks
In this paper security requirements and security architecture for 4G systems are presented with the consideration of Trusted Computing (TC) for mobile equipment (ME). The security...
Yu Zheng, Dake He, Weichi Yu, Xiaohu Tang
SC
2003
ACM
15 years 9 months ago
Parallel Multilevel Sparse Approximate Inverse Preconditioners in Large Sparse Matrix Computations
We investigate the use of the multistep successive preconditioning strategies (MSP) to construct a class of parallel multilevel sparse approximate inverse (SAI) preconditioners. W...
Kai Wang, Jun Zhang, Chi Shen