Sciweavers

899 search results - page 122 / 180
» Dependence Analysis of Parallel and Distributed Programs and...
Sort
View
IPPS
2007
IEEE
15 years 4 months ago
Transaction Based Authentication Scheme for Mobile Communication: A Cognitive Agent Based Approach
The vulnerable air interface, device level constraints, and insecure encryption techniques of wireless networks have naturally increased the chance of attacker obtaining users inf...
B. Sathish Babu, Pallapa Venkataram
IPPS
1998
IEEE
15 years 2 months ago
Multiparadigm, Multilingual Interoperability: Experience with Converse
The Converse run-time framework was designed with dual objectives: that of supporting quick development of portable run-time systems for new parallel programming paradigms, and tha...
Laxmikant V. Kalé, Milind A. Bhandarkar, Ro...
DAC
2008
ACM
14 years 11 months ago
Application mapping for chip multiprocessors
The problem attacked in this paper is one of automatically mapping an application onto a Network-on-Chip (NoC) based chip multiprocessor (CMP) architecture in a locality-aware fas...
Guangyu Chen, Feihui Li, Seung Woo Son, Mahmut T. ...
113
Voted
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
13 years 7 days ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...
SIGMOD
2012
ACM
226views Database» more  SIGMOD 2012»
13 years 7 days ago
SkewTune: mitigating skew in mapreduce applications
We present an automatic skew mitigation approach for userdefined MapReduce programs and present SkewTune, a system that implements this approach as a drop-in replacement for an e...
YongChul Kwon, Magdalena Balazinska, Bill Howe, Je...