Sciweavers

795 search results - page 128 / 159
» Efficient Coupling of Parallel Applications Using PAWS
Sort
View
TC
2008
14 years 9 months ago
Cryptanalysis with COPACOBANA
Cryptanalysis of ciphers usually involves massive computations. The security parameters of cryptographic algorithms are commonly chosen so that attacks are infeasible with availabl...
Tim Güneysu, Timo Kasper, Martin Novotn&yacut...
IPPS
2008
IEEE
15 years 3 months ago
Reducing wasted resources to help achieve green data centers
In this paper we introduce a new approach to the consolidation strategy of a data center that allows an important reduction in the amount of active nodes required to process a het...
Jordi Torres, David Carrera, Kevin Hogan, Ricard G...
89
Voted
CLUSTER
2006
IEEE
15 years 1 months ago
Modeling Network Contention Effects on All-to-All Operations
One of the most important collective communication patterns used in scientific applications is the complete exchange, also called All-to-All. Although efficient complete exchange ...
Luiz Angelo Steffenel
DCOSS
2008
Springer
14 years 11 months ago
CaliBree: A Self-calibration System for Mobile Sensor Networks
We propose CaliBree, a self-calibration system for mobile wireless sensor networks. Sensors calibration is a fundamental problem in a sensor network. If sensor devices are not prop...
Emiliano Miluzzo, Nicholas D. Lane, Andrew T. Camp...
FTTCS
2006
132views more  FTTCS 2006»
14 years 9 months ago
Algorithms and Data Structures for External Memory
Data sets in large applications are often too massive to fit completely inside the computer's internal memory. The resulting input/output communication (or I/O) between fast ...
Jeffrey Scott Vitter