NFS is considered to be the bottleneck in cluster computing environment because of its limited resources and centralized data management. With the development of hardware, NFS ser...
Huan Chen, Yi Zhao, Jin Xiong, Jie Ma, Ninghui Sun
Solving optimally large instances of combinatorial optimization problems requires a huge amount of computational resources. In this paper, we propose an adaptation of the parallel...
In this paper we present a novel tag removal method for tagged cardiac MR images. This method is based on a 2D bandstop filtering technique, which selectively attenuates the tag ...
Zhen Qian, Rui Huang, Dimitris N. Metaxas, Leon Ax...
This paper examines the application of Tornado Codes, a class of low density parity check (LDPC) erasure codes, to archival storage systems based on massive arrays of idle disks (...
A widely used approach to avoid network intrusion is SNORT, an open source Network Intrusion Detection System (NIDS). This work describes SPP-NIDS, a architecture for intrusion de...
Luis Carlos Caruso, Guilherme Guindani, Hugo Schmi...