Sciweavers

363 search results - page 63 / 73
» Dynamic Resource Allocation in Enterprise Systems
Sort
View
CSFW
2011
IEEE
13 years 9 months ago
Local Memory via Layout Randomization
—Randomization is used in computer security as a tool to introduce unpredictability into the software infrastructure. In this paper, we study the use of randomization to achieve ...
Radha Jagadeesan, Corin Pitcher, Julian Rathke, Ja...
ICPP
2006
IEEE
15 years 3 months ago
Inter-Overlay Cooperation in High-Bandwidth Overlay Multicast
The cooperation of end users can be exploited to boost the performance of high-bandwidth multicast. While intraoverlay cooperation, the mechanism for cooperation within a single o...
Guang Tan, Stephen A. Jarvis
WOB
2004
233views Bioinformatics» more  WOB 2004»
14 years 11 months ago
Recent Advances in Gene Expression Data Clustering: A Case Study with Comparative Results
Several advanced techniques have been proposed for data clustering and many of them have been applied to gene expression data, with partial success. The high dimensionality and the...
George Barreto Bezerra, Geraldo M. A. Cança...
JPDC
2011
129views more  JPDC 2011»
14 years 4 months ago
Static timing analysis for modeling QoS in networks-on-chip
Networks-on-chip (NoCs) are used in a growing number of SoCs and multi-core processors. Because messages compete for the NoC’s shared resources, quality of service and resource ...
Evgeni Krimer, Isaac Keslassy, Avinoam Kolodny, Is...
ICCCN
2007
IEEE
15 years 4 months ago
Lagniappe: Multi-* Programming Made Simple
—The emergence of multi-processor, multi-threaded architectures (referred to as multi- architectures) facilitates the design of high-throughput request processing systems (e.g., ...
Taylor L. Riché, R. Greg Lavender, Harrick ...