Sciweavers

5640 search results - page 232 / 1128
» The Primacy of Process Architecture
Sort
View
148
Voted
HIPEAC
2009
Springer
15 years 7 months ago
Predictive Runtime Code Scheduling for Heterogeneous Architectures
Heterogeneous architectures are currently widespread. With the advent of easy-to-program general purpose GPUs, virtually every recent desktop computer is a heterogeneous system. Co...
Víctor J. Jiménez, Lluís Vila...
97
Voted
ICIW
2009
IEEE
15 years 7 months ago
An Architecture for Reliable Mobile Workflow in a Grid Environment
— Mobile peer to peer (P2P) computing is becoming a major revolution in computing owing to advances in computing power, network connectivity and storage capacity of mobile device...
Bill Karakostas, George Fakas
136
Voted
COMSWARE
2007
IEEE
15 years 7 months ago
An Architecture and a Programming Interface for Application-Aware Data Dissemination Using Overlay Networks
- Many real-time distributed collaborative applications are emerging that require exchange of critical sensor data among geographically distant end users under resource-constrained...
Tarun Banka, Panho Lee, Anura P. Jayasumana, Jim K...
82
Voted
CCGRID
2005
IEEE
15 years 6 months ago
Instant attack stopper in InfiniBand architecture
With the growing popularity of cluster architectures in datacenters and the sophistication of computer attacks, the design of highly secure clusters has recently emerged as a crit...
Manhee Lee, Mazin S. Yousif
HIPEAC
2005
Springer
15 years 6 months ago
Memory-Centric Security Architecture
Abstract. This paper presents a new security architecture for protecting software confidentiality and integrity. Different from the previous process-centric systems designed for ...
Weidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee