Sciweavers

4049 search results - page 722 / 810
» Neural Network Trainer through Computer Networks
Sort
View
HPCA
2008
IEEE
15 years 10 months ago
Single-level integrity and confidentiality protection for distributed shared memory multiprocessors
Multiprocessor computer systems are currently widely used in commercial settings to run critical applications. These applications often operate on sensitive data such as customer ...
Brian Rogers, Chenyu Yan, Siddhartha Chhabra, Milo...
PPOPP
2010
ACM
15 years 7 months ago
Symbolic prefetching in transactional distributed shared memory
We present a static analysis for the automatic generation of symbolic prefetches in a transactional distributed shared memory. A symbolic prefetch specifies the first object to be...
Alokika Dash, Brian Demsky
GECCO
2009
Springer
131views Optimization» more  GECCO 2009»
15 years 4 months ago
Evolution of robust data distribution among digital organisms
This paper describes a study of the evolution of robust communication, specifically the distribution of data among individuals in a population, using digital evolution. In digita...
David B. Knoester, Andres J. Ramirez, Philip K. Mc...
MIDDLEWARE
2009
Springer
15 years 4 months ago
PAQ: Persistent Adaptive Query Middleware for Dynamic Environments
Abstract. Pervasive computing applications often entail continuous monitoring tasks, issuing persistent queries that return continuously updated views of the operational environmen...
Vasanth Rajamani, Christine Julien, Jamie Payton, ...
SIGCSE
2010
ACM
183views Education» more  SIGCSE 2010»
15 years 4 months ago
Electronic commerce virtual laboratory
Website security is essential for successful e-commerce ventures, but the vital “how-to” components of security are often lacking in academic courses. This paper describes our...
Joel Coffman, Alfred C. Weaver