Sciweavers

3660 search results - page 670 / 732
» Parallel Program Archetypes
Sort
View
AUSFORENSICS
2004
14 years 11 months ago
An Analysis and Comparison of Clustered Password Crackers
Password policies alone do not stand a chance of securing computer systems which rely on the use of secretbased, password authentication methods. The enforcement of "strong&q...
Christian Frichot
ICETE
2004
159views Business» more  ICETE 2004»
14 years 11 months ago
When Business Models Go Bad: The Music Industry's Future
: The music industry is an interesting example for how business models from the pre-Internet area can get into trouble in the new Internet-based economy. Since 2000, the music indu...
Erik Wilde, Jacqueline Schwerzmann
PDPTA
2003
14 years 11 months ago
Distop: A Low-Overhead Cluster Monitoring System
Current systems for managing workload on clusters of workstations, particularly those available for Linux-based (Beowulf) clusters, are typically based on traditional process-base...
Daniel Andresen, Nathan Schopf, Ethan Bowker, Timo...
WSCG
2003
170views more  WSCG 2003»
14 years 11 months ago
Experimental System for Visualization of the Light Load
This paper presents our work on an experimental system for visualization of the light load. The light load is thought as the total amount of light radiation received by all areas ...
Martin Cadík, Pavel Slavík, Jan Prik...
IOPADS
1997
94views more  IOPADS 1997»
14 years 11 months ago
Remote I/O Fast Access to Distant Storage
As high-speed networks make it easier to use distributed resources, it becomes increasingly common that applications and their data are not colocated. Users have traditionally add...
Ian T. Foster, David Kohr, Rakesh Krishnaiyer, Jac...