Sciweavers

795 search results - page 128 / 159
» Efficient Coupling of Parallel Applications Using PAWS
Sort
View
104
Voted
TC
2008
15 years 11 days ago
Cryptanalysis with COPACOBANA
Cryptanalysis of ciphers usually involves massive computations. The security parameters of cryptographic algorithms are commonly chosen so that attacks are infeasible with availabl...
Tim Güneysu, Timo Kasper, Martin Novotn&yacut...
117
Voted
IPPS
2008
IEEE
15 years 6 months ago
Reducing wasted resources to help achieve green data centers
In this paper we introduce a new approach to the consolidation strategy of a data center that allows an important reduction in the amount of active nodes required to process a het...
Jordi Torres, David Carrera, Kevin Hogan, Ricard G...
114
Voted
CLUSTER
2006
IEEE
15 years 4 months ago
Modeling Network Contention Effects on All-to-All Operations
One of the most important collective communication patterns used in scientific applications is the complete exchange, also called All-to-All. Although efficient complete exchange ...
Luiz Angelo Steffenel
106
Voted
DCOSS
2008
Springer
15 years 2 months ago
CaliBree: A Self-calibration System for Mobile Sensor Networks
We propose CaliBree, a self-calibration system for mobile wireless sensor networks. Sensors calibration is a fundamental problem in a sensor network. If sensor devices are not prop...
Emiliano Miluzzo, Nicholas D. Lane, Andrew T. Camp...
118
Voted
FTTCS
2006
132views more  FTTCS 2006»
15 years 14 days ago
Algorithms and Data Structures for External Memory
Data sets in large applications are often too massive to fit completely inside the computer's internal memory. The resulting input/output communication (or I/O) between fast ...
Jeffrey Scott Vitter