Sciweavers

1445 search results - page 247 / 289
» Distributed Computing Technologies and Their Application to ...
Sort
View
115
Voted
HPCA
2005
IEEE
16 years 26 days ago
SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs
Memory leaks and memory corruption are two major forms of software bugs that severely threaten system availability and security. According to the US-CERT Vulnerability Notes Datab...
Feng Qin, Shan Lu, Yuanyuan Zhou
HPCA
2003
IEEE
16 years 26 days ago
Evaluating the Impact of Communication Architecture on the Performability of Cluster-Based Services
We consider the impact of different communication architectures on the performability (performance + availability) of cluster-based servers. In particular, we use a combination of ...
Kiran Nagaraja, Neeraj Krishnan, Ricardo Bianchini...
FOCS
2009
IEEE
15 years 7 months ago
Faster Generation of Random Spanning Trees
In this paper, we set forth a new algorithm for generating approximately uniformly random spanning trees in undirected graphs. We show how to sample from a distribution that is wi...
Jonathan A. Kelner, Aleksander Madry
101
Voted
SIGCOMM
2009
ACM
15 years 7 months ago
Rapid service creation using the JUNOS SDK
The creation of services on IP networks is a lengthy process. The development time is further increased if this involves the equipment manufacturer adding third-party technology i...
James Kelly, Wladimir Araujo, Kallol Banerjee
117
Voted
CCGRID
2008
IEEE
15 years 7 months ago
MPI Collectives on Modern Multicore Clusters: Performance Optimizations and Communication Characteristics
The advances in multicore technology and modern interconnects is rapidly accelerating the number of cores deployed in today’s commodity clusters. A majority of parallel applicat...
Amith R. Mamidala, Rahul Kumar, Debraj De, Dhabale...