Sciweavers

140 search results - page 6 / 28
» The anatomy of big data computing
Sort
View
ICPPW
2009
IEEE
14 years 7 months ago
Characterizing the Performance of
Using Linux for high-performance applications on the compute nodes of IBM Blue Gene/P is challenging because of TLB misses and difficulties with programming the network DMA engine...
Kazutomo Yoshii, Kamil Iskra, Harish Naik, Pete Be...
MICCAI
2010
Springer
14 years 8 months ago
4D Computed Tomography Reconstruction from Few-Projection Data via Temporal Non-local Regularization
Abstract. 4D computed tomography (4D-CT) is an important modality in medical imaging due to its ability to resolve patient anatomy motion in each respiratory phase. Conventionally ...
Xun Jia, Yifei Lou, Bin Dong, Zhen Tian, Steve B. ...
72
Voted
AINA
2009
IEEE
15 years 4 months ago
Improving Opportunistic Data Dissemination via Known Vector
An opportunistic network is a network where each node only has connectiviy with other nodes opportunistically. To disseminate data in this kind of network is a challenging task an...
Jyh-How Huang, Ying-Yu Chen, Yi-Chao Chen, Shivaka...
HICSS
2009
IEEE
122views Biometrics» more  HICSS 2009»
15 years 4 months ago
GrayWulf: Scalable Software Architecture for Data Intensive Computing
Big data presents new challenges to both cluster infrastructure software and parallel application design. We present a set of software services and design principles for data inte...
Yogesh Simmhan, Roger S. Barga, Catharine van Inge...
NSDI
2008
14 years 12 months ago
Behind Phishing: An Examination of Phisher Modi Operandi
Phishing costs Internet users billions of dollars a year. Using various data sets collected in real-time, this paper analyzes various aspects of phisher modi operandi. We examine ...
D. Kevin McGrath, Minaxi Gupta