Sciweavers

6770 search results - page 464 / 1354
» How GPUs Work
Sort
View
GRID
2005
Springer
15 years 10 months ago
Web services and grid security vulnerabilities and threats analysis and model
The paper provides an overview of available web applications and Web Services security vulnerability models and proposes a classification of the potential Grid and Web Services at...
Yuri Demchenko, Leon Gommans, Cees T. A. M. de Laa...
HPCC
2005
Springer
15 years 10 months ago
Trace-Based Parallel Performance Overhead Compensation
Abstract. Tracing parallel programs to observe their performance introduces intrusion as the result of trace measurement overhead. If post-mortem trace analysis does not compensate...
Felix Wolf, Allen D. Malony, Sameer Shende, Alan M...
148
Voted
ICALP
2005
Springer
15 years 10 months ago
Up-to Techniques for Weak Bisimulation
Abstract. We study the use of the elaboration preorder (due to ArunKumar and Natarajan) in the framework of up-to techniques for weak bisimulation. We show that elaboration yields ...
Damien Pous
ICARIS
2005
Springer
15 years 10 months ago
Fugue: An Interactive Immersive Audiovisualisation and Artwork Using an Artificial Immune System
Fugue is the result of a collaboration between artist, musician and computer scientists. The result is an on-going project which provides a new way of communicating complex scienti...
Peter J. Bentley, Gordana Novakovic, Anthony Ruto
ICLP
2005
Springer
15 years 10 months ago
A Comparison of CLP(FD) and ASP Solutions to NP-Complete Problems
This paper presents experimental comparisons between declarative encodings of various computationally hard problems in both Answer Set Programming (ASP) and Constraint Logic Progra...
Agostino Dovier, Andrea Formisano, Enrico Pontelli