Sciweavers

5790 search results - page 870 / 1158
» Distributed programming with distributed authorization
Sort
View
96
Voted
CLUSTER
2007
IEEE
15 years 9 months ago
The challenges and rewards of petascale clusters
-Jul 2 - Santa Clara Conv Ctr - abstracts by 4/30 Asilomar Conference on Signals, Systems, and Computers due by June 1 [more] - Nov 1-4, 2009 - Asilomar Conf Grounds, Pacific Grove...
Mark Seager
123
Voted
HICSS
2007
IEEE
90views Biometrics» more  HICSS 2007»
15 years 9 months ago
Optimizing Regional Aid during Public Health Emergencies: An Autonomic Resource Allocation Approach
A large scale public health emergency such as an epidemic (occurring naturally or due to a bioterrorism attack) can result in an overwhelming number of human casualties. This can ...
Hina Arora, T. S. Raghu, Ajay S. Vinze
105
Voted
IEEEPACT
2007
IEEE
15 years 9 months ago
Error Detection Using Dynamic Dataflow Verification
Continued scaling of CMOS technology to smaller transistor sizes makes modern processors more susceptible to both transient and permanent hardware faults. Circuitlevel techniques ...
Albert Meixner, Daniel J. Sorin
IEEEPACT
2007
IEEE
15 years 9 months ago
Component-Based Lock Allocation
The allocation of lock objects to critical sections in concurrent programs affects both performance and correctness. Recent work explores automatic lock allocation, aiming primari...
Richard L. Halpert, Christopher J. F. Pickett, Cla...
101
Voted
CONCUR
2007
Springer
15 years 8 months ago
Asynchronous Games: Innocence Without Alternation
The notion of innocent strategy was introduced by Hyland and Ong in order to capture the interactive behaviour of λ-terms and PCF programs. An innocent strategy is defined as an ...
Paul-André Melliès, Samuel Mimram