Sciweavers

968 search results - page 150 / 194
» Evaluating Benchmark Subsetting Approaches
Sort
View
ICAC
2008
IEEE
15 years 11 months ago
CARVE: A Cognitive Agent for Resource Value Estimation
Recently, industry has begun investigating and moving towards utility computing, where computational resources (processing, memory and I/O) are availably on demand at a market cos...
Jonathan Wildstrom, Peter Stone, Emmett Witchel
ICSM
2008
IEEE
15 years 11 months ago
Change impact analysis for AspectJ programs
Change impact analysis is a useful technique for software evolution. It determines the effects of a source editing session and provides valuable feedbacks to the programmers for m...
Sai Zhang, Zhongxian Gu, Yu Lin, Jianjun Zhao
ACSAC
2007
IEEE
15 years 11 months ago
MetaAware: Identifying Metamorphic Malware
Detection of malicious software (malware) by the use of static signatures is often criticized for being overly simplistic. Available methods of obfuscating code (so-called metamor...
Qinghua Zhang, Douglas S. Reeves
126
Voted
IPPS
2007
IEEE
15 years 11 months ago
Building the Tree of Life on Terascale Systems
Bayesian phylogenetic inference is an important alternative to maximum likelihood-based phylogenetic method. However, inferring large trees using the Bayesian approach is computat...
Xizhou Feng, Kirk W. Cameron, Carlos P. Sosa, Bria...
IPPS
2007
IEEE
15 years 11 months ago
Improving MPI Independent Write Performance Using A Two-Stage Write-Behind Buffering Method
Many large-scale production applications often have very long executions times and require periodic data checkpoints in order to save the state of the computation for program rest...
Wei-keng Liao, Avery Ching, Kenin Coloma, Alok N. ...