Sciweavers

5451 search results - page 925 / 1091
» Typed Operational Semantics
Sort
View
115
Voted
CCGRID
2003
IEEE
15 years 9 months ago
Noncontiguous I/O Accesses Through MPI-IO
I/O performance remains a weakness of parallel computing systems today. While this weakness is partly attributed to rapid advances in other system components, I/O interfaces avail...
Avery Ching, Alok N. Choudhary, Kenin Coloma, Wei-...
106
Voted
DSN
2003
IEEE
15 years 9 months ago
Characterization of Linux Kernel Behavior under Errors
This paper describes an experimental study of Linux kernel behavior in the presence of errors that impact the instruction stream of the kernel code. Extensive error injection exper...
Weining Gu, Zbigniew Kalbarczyk, Ravishankar K. Iy...
IAW
2003
IEEE
15 years 9 months ago
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks
– Computer Networks connected to the Internet continue to be compromised and exploited by hackers. This is in spite of the fact that many networks run some type of security mecha...
John G. Levine, Richard LaBella, Henry L. Owen, Di...
139
Voted
ICNP
2003
IEEE
15 years 9 months ago
Non-Uniform Information Dissemination for Sensor Networks
Future smart environments will be characterized by multiple nodes that sense, collect, and disseminate information about environmental phenomena through a wireless network. In thi...
Sameer Tilak, Amy L. Murphy, Wendi Rabiner Heinzel...
146
Voted
ICRA
2003
IEEE
146views Robotics» more  ICRA 2003»
15 years 9 months ago
Bundled carbon nanotubes as electronic circuit and sensing elements
- Bundled multi-walled carbon nanotubes (MWNT) were successfully and repeatably manipulated by AC electrophoresis to form resistive elements between Au microelectrodes and were dem...
Victor T. S. Wong, Wen J. Li