Sciweavers

1826 search results - page 340 / 366
» Controlling data movement in global computing applications
Sort
View
WCE
2007
14 years 11 months ago
Modeling and Analysis of an Elastic Compound Strut in Axial Compression
— This paper presents an analytical model for calculating the deformation behavior of an elastic, composite strut comprising any number of materials, which are represented by an ...
Joshua R. Omer
SIGCOMM
2010
ACM
14 years 10 months ago
Improving peer-to-peer file distribution: winner doesn't have to take all
Recent work on BitTorrent has shown that the choke/unchoke mechanism implements an auction where each peer tries to induce other peers into "unchoking" it by uploading m...
Ben Leong, Youming Wang, Su Wen, Cristina Carbunar...
ISBI
2008
IEEE
15 years 10 months ago
Distributed online anomaly detection in high-content screening
This paper presents an automated, online approach to anomaly detection in high-content screening assays for pharmaceutical research. Online detection of anomalies is attractive be...
Adam Goode, Rahul Sukthankar, Lily B. Mummert, Mei...
PERCOM
2007
ACM
15 years 9 months ago
SMOCK: A Self-Contained Public Key Management Scheme for Mission-Critical Wireless Ad Hoc Networks
Mobile ad hoc networks show great potential in emergency response and/or recovery. Such mission-critical applications demand security service be "anywhere", "anytim...
Wenbo He, Ying Huang, Klara Nahrstedt, Whay Chiou ...
RTSS
2009
IEEE
15 years 4 months ago
Timing Analysis of Concurrent Programs Running on Shared Cache Multi-Cores
—Memory accesses form an important source of timing unpredictability. Timing analysis of real-time embedded software thus requires bounding the time for memory accesses. Multipro...
Yan Li, Vivy Suhendra, Yun Liang, Tulika Mitra, Ab...