Sciweavers

5234 search results - page 833 / 1047
» Simulation of Computer Network Attacks
Sort
View
CNHPCA
2009
Springer
15 years 11 months ago
Benchmarking Parallel I/O Performance for a Large Scale Scientific Application on the TeraGrid
This paper is a report on experiences in benchmarking I/O performance on leading computational facilities on the NSF TeraGrid network with a large scale scientific application. In...
Frank Löffler, Jian Tao, Gabrielle Allen, Eri...
DSN
2005
IEEE
15 years 10 months ago
Engineering Over-Clocking: Reliability-Performance Trade-Offs for High-Performance Register Files
Register files are in the critical path of most high-performance processors and their latency is one of the most important factors that limit their size. Our goal is to develop er...
Gokhan Memik, Masud H. Chowdhury, Arindam Mallik, ...
ICDM
2003
IEEE
141views Data Mining» more  ICDM 2003»
15 years 9 months ago
Association Rule Mining in Peer-to-Peer Systems
We extend the problem of association rule mining – a key data mining problem – to systems in which the database is partitioned among a very large number of computers that are ...
Ran Wolff, Assaf Schuster
BROADNETS
2004
IEEE
15 years 8 months ago
Handheld Routers: Intelligent Bandwidth Aggregation for Mobile Collaborative Communities
Multi-homed, mobile wireless computing and communication devices can spontaneously form communities to logically combine and share the bandwidth of each other's wide-area com...
Puneet Sharma, Sung-Ju Lee, Jack Brassil, Kang G. ...
JCP
2008
120views more  JCP 2008»
15 years 4 months ago
Multimedia Resource Replication Strategy for a Pervasive Peer-to-Peer Environment
The computer world is experiencing a paradigm shift towards context-aware pervasive computing, where diverse computer devices communicate with each other through different network ...
Letian Rong