Sciweavers

5564 search results - page 191 / 1113
» Performance Modeling of HPC Applications
Sort
View
110
Voted
ACSAC
2004
IEEE
15 years 7 months ago
Securing a Remote Terminal Application with a Mobile Trusted Device
Many real-world applications use credentials such as passwords as means of user authentication. When accessed from untrusted public terminals, such applications are vulnerable to ...
Alina Oprea, Dirk Balfanz, Glenn Durfee, Diana K. ...
212
Voted
SIGMOD
2009
ACM
137views Database» more  SIGMOD 2009»
16 years 3 months ago
Advances in flash memory SSD technology for enterprise database applications
The past few decades have witnessed a chronic and widening imbalance among processor bandwidth, disk capacity, and access speed of disk. According to Amdhal's law, the perfor...
Sang-Won Lee, Bongki Moon, Chanik Park
112
Voted
EUROPAR
2008
Springer
15 years 5 months ago
Mapping Heterogeneous Distributed Applications on Clusters
Performance of distributed applications largely depends on the mapping of their components on the underlying architecture. On one mponent-based approaches provide an abstraction su...
Sylvain Jubertie, Emmanuel Melin, Jér&eacut...
168
Voted
IPPS
2005
IEEE
15 years 9 months ago
A Compiler Method for Memory-Conscious Mapping of Applications on Coarse-Grained Reconfigurable Architectures
This paper presents a compiler methodology for memoryaware mapping on 2-Dimensional coarse-grained reconfigurable architectures that aims in improving the mapped applications’ p...
Grigoris Dimitroulakos, Michalis D. Galanis, Costa...
118
Voted
SRDS
1999
IEEE
15 years 7 months ago
Enforcing Determinism for the Consistent Replication of Multithreaded CORBA Applications
In CORBA-based applications that depend on object replication for fault tolerance, inconsistencies in the states of the replicas of an object can arise when concurrent threads wit...
Priya Narasimhan, Louise E. Moser, P. M. Melliar-S...