Sciweavers

213 search results - page 32 / 43
» The Computational and Storage Potential of Volunteer Computi...
Sort
View
123
Voted
PERCOM
2007
ACM
15 years 11 months ago
SMOCK: A Self-Contained Public Key Management Scheme for Mission-Critical Wireless Ad Hoc Networks
Mobile ad hoc networks show great potential in emergency response and/or recovery. Such mission-critical applications demand security service be "anywhere", "anytim...
Wenbo He, Ying Huang, Klara Nahrstedt, Whay Chiou ...
102
Voted
ISPASS
2010
IEEE
15 years 6 months ago
Hardware prediction of OS run-length for fine-grained resource customization
—In the past ten years, computer architecture has seen a paradigm shift from emphasizing single thread performance to energy efficient, throughput oriented, chip multiprocessors...
David Nellans, Kshitij Sudan, Rajeev Balasubramoni...
IEEEPACT
2009
IEEE
15 years 6 months ago
Interprocedural Load Elimination for Dynamic Optimization of Parallel Programs
Abstract—Load elimination is a classical compiler transformation that is increasing in importance for multi-core and many-core architectures. The effect of the transformation is ...
Rajkishore Barik, Vivek Sarkar
AVI
2004
15 years 1 months ago
Display space usage and window management operation comparisons between single monitor and multiple monitor users
The continuing trend toward greater processing power, larger storage, and in particular increased display surface by using multiple monitor supports increased multi-tasking by the...
Dugald Ralph Hutchings, Greg Smith, Brian Meyers, ...
PAA
2008
14 years 11 months ago
Prototype reduction using an artificial immune model
Artificial immune system (AIS)-based pattern classification approach is relatively new in the field of pattern recognition. The study explores the potentiality of this paradigm in ...
Utpal Garain