Sciweavers

2297 search results - page 258 / 460
» Production of Large Computer Programs
Sort
View
JSSPP
1997
Springer
15 years 6 months ago
Memory Usage in the LANL CM-5 Workload
It is generally agreed that memory requirements should be taken into account in the scheduling of parallel jobs. However, so far the work on combined processor and memory schedulin...
Dror G. Feitelson
ACSC
2004
IEEE
15 years 6 months ago
Detecting Privacy and Ethical Sensitivity in Data Mining Results
Knowledge discovery allows considerable insight into data. This brings with it the inherent risk that what is inferred may be private or ethically sensitive. The process of genera...
Peter Fule, John F. Roddick
DSN
2009
IEEE
15 years 5 months ago
Precise request tracing and performance debugging for multi-tier services of black boxes
As more and more multi-tier services are developed from commercial components or heterogeneous middleware without the source code available, both developers and administrators nee...
Zhihong Zhang, Jianfeng Zhan, Yong Li, Lei Wang, D...
94
Voted
NSDI
2008
15 years 4 months ago
Ghost Turns Zombie: Exploring the Life Cycle of Web-based Malware
While the web provides information and services that enrich our lives in many ways, it has also become the primary vehicle for delivering malware. Once infected with web-based mal...
Michalis Polychronakis, Niels Provos
126
Voted
AISC
2008
Springer
15 years 4 months ago
Strategies for Solving SAT in Grids by Randomized Search
Grid computing offers a promising approach to solving challenging computational problems in an environment consisting of a large number of easily accessible resources. In this pape...
Antti Eero Johannes Hyvärinen, Tommi A. Juntt...