Sciweavers

34181 search results - page 390 / 6837
» The Computer System GRAPHOGRAPH
Sort
View
134
Voted
IPPS
2010
IEEE
15 years 1 months ago
Overlapping computation and communication: Barrier algorithms and ConnectX-2 CORE-Direct capabilities
Abstract--This paper explores the computation and communication overlap capabilities enabled by the new CORE-Direct hardware capabilities introduced in the InfiniBand (IB) Host Cha...
Richard L. Graham, Stephen W. Poole, Pavel Shamis,...
130
Voted
TEC
2010
162views more  TEC 2010»
14 years 10 months ago
Computational Evolutionary Embryogeny
in HTML. Full version in PDF. 08i YOGEV, O., SHAPIRO, A. A., AND ANTONSSON, E. K. Computational Evolutionary Embryogeny. IEEE Transactions on Evolutionary Computation. Accepted for...
Or Yogev, Andrew A. Shapiro, Erik K. Antonsson
143
Voted
BWCCA
2010
14 years 10 months ago
Fast Deployment of Computer Forensics with USBs
As popularity of the Internet continues to grow, it changes the way of computer crime. Number of computer crime increases dramatically in recent years and investigators have been f...
Chung-Huang Yang, Pei-Hua Yen
152
Voted
CCGRID
2011
IEEE
14 years 7 months ago
Towards Real-Time, Volunteer Distributed Computing
Many large-scale distributed computing applications demand real-time responses by soft deadlines. To enable such real-time task distribution and execution on the volunteer resourc...
Sangho Yi, Emmanuel Jeannot, Derrick Kondo, David ...
138
Voted
CCS
2011
ACM
14 years 3 months ago
Automatically optimizing secure computation
On the one hand, compilers for secure computation protocols, such as FairPlay or FairPlayMP, have significantly simplified the development of such protocols. On the other hand, ...
Florian Kerschbaum