Sciweavers

458 search results - page 67 / 92
» Potential Performance Improvement of Collective Operations i...
Sort
View
110
Voted
ASIAN
2004
Springer
117views Algorithms» more  ASIAN 2004»
15 years 6 months ago
The Feature Selection and Intrusion Detection Problems
Cyber security is a serious global concern. The potential of cyber terrorism has posed a threat to national security; meanwhile the increasing prevalence of malware and incidents o...
Andrew H. Sung, Srinivas Mukkamala
99
Voted
EUROPAR
2003
Springer
15 years 5 months ago
FOBS: A Lightweight Communication Protocol for Grid Computing
The advent of high-performance networks in conjunction with low-cost, powerful computational engines has made possible the development of a new set of technologies termed computat...
Phillip M. Dickens
101
Voted
BMCBI
2008
88views more  BMCBI 2008»
15 years 20 days ago
Microarray-based gene set analysis: a comparison of current methods
Background: The analysis of gene sets has become a popular topic in recent times, with researchers attempting to improve the interpretability and reproducibility of their microarr...
Sarah Song, Michael A. Black
101
Voted
ICDCS
2005
IEEE
15 years 6 months ago
Network-Centric Buffer Cache Organization
A pass-through server such as an NFS server backed by an iSCSI[1] storage server only passes data between the storage server and NFS clients. Ideally it should require at most one...
Gang Peng, Srikant Sharma, Tzi-cker Chiueh
CF
2006
ACM
15 years 6 months ago
Exploiting locality to ameliorate packet queue contention and serialization
Packet processing systems maintain high throughput despite relatively high memory latencies by exploiting the coarse-grained parallelism available between packets. In particular, ...
Sailesh Kumar, John Maschmeyer, Patrick Crowley