Sciweavers

539 search results - page 79 / 108
» The N R One Time Password System
Sort
View
ICDE
2012
IEEE
224views Database» more  ICDE 2012»
13 years 3 days ago
Exploiting Common Subexpressions for Cloud Query Processing
—Many companies now routinely run massive data analysis jobs – expressed in some scripting language – on large clusters of low-end servers. Many analysis scripts are complex ...
Yasin N. Silva, Paul-Ake Larson, Jingren Zhou
55
Voted
IPPS
1993
IEEE
15 years 1 months ago
Parallel Algorithms for Hypercube Allocation
Abstract - Parallel algorithms of the hypercube allocation strategies are considered in this paper. Although the sequential algorithms of various hypercube allocation strategies ar...
Yeimkuan Chang, Laxmi N. Bhuyan
ICS
2010
Tsinghua U.
15 years 3 days ago
Clustering performance data efficiently at massive scales
Existing supercomputers have hundreds of thousands of processor cores, and future systems may have hundreds of millions. Developers need detailed performance measurements to tune ...
Todd Gamblin, Bronis R. de Supinski, Martin Schulz...
HICSS
2009
IEEE
122views Biometrics» more  HICSS 2009»
15 years 4 months ago
Empirical Estimates and Observations of 0Day Vulnerabilities
We define a 0Day vulnerability to be any vulnerability, in deployed software, that has been discovered by at least one person but has not yet been publicly announced or patched. T...
Miles A. McQueen, Trevor A. McQueen, Wayne F. Boye...
ICVS
1999
Springer
15 years 1 months ago
Ascender II, a Visual Framework for 3D Reconstruction
This paper presents interim results from an ongoing project on aerial image reconstruction. One important task in image interpretation is the process of understanding and identifyi...
Maurício Marengoni, Christopher O. Jaynes, ...