Sciweavers

311 search results - page 43 / 63
» Open Issues in MPI Implementation
Sort
View
117
Voted
COMPSAC
2008
IEEE
15 years 9 months ago
Mutation-Based Testing of Buffer Overflow Vulnerabilities
Buffer overflow (BOF) is one of the major vulnerabilities that leads to non-secure software. Testing an implementation for BOF vulnerabilities is challenging as the underlying rea...
Hossain Shahriar, Mohammad Zulkernine
112
Voted
IPPS
2007
IEEE
15 years 9 months ago
Domain Decomposition vs. Master-Slave in Apparently Homogeneous Systems
This paper investigates the utilization of the master-slave (MS) paradigm as an alternative to domain decomposition (DD) methods for parallelizing lattice gauge theory (LGT) model...
Cyril Banino-Rokkones
96
Voted
CCS
2007
ACM
15 years 9 months ago
Trust management services in relational databases
Trust management represents today a promising approach for supporting access control in open environments. While several approaches have been proposed for trust management and sig...
Sabrina De Capitani di Vimercati, Sushil Jajodia, ...
135
Voted
MOBICOM
2006
ACM
15 years 9 months ago
Using packet probes for available bandwidth estimation: a wireless testbed experience
Evaluating available bandwidth estimation methods requires a malleable MAC protocol implementation, precise MAC layer packet timing measurements, and the ability to create control...
Mesut Ali Ergin, Marco Gruteser
DEXAW
2005
IEEE
96views Database» more  DEXAW 2005»
15 years 9 months ago
Multiplication over Time to Facilitate Peer-to-Peer Barter Relationships
A peer-to-peer complementary currency can be a powerful tool for promoting exchanges that make use of underutilized computing resources in a trusted way. i-WAT[11] is a proposed s...
Kenji Saito, Eiichi Morino, Jun Murai