Sciweavers

338 search results - page 63 / 68
» Using Grid Technologies for Web-Enabling Legacy Systems
Sort
View
WEBI
2009
Springer
15 years 4 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
IEEECIT
2010
IEEE
14 years 8 months ago
Developing a Cloud Computing Charging Model for High-Performance Computing Resources
Abstract—This paper examines the economics of cloud computing charging from the perspective of a supercomputing resource provider offering its own resources. To evaluate the comp...
Matthew Woitaszek, Henry M. Tufo
95
Voted
AOSD
2009
ACM
15 years 4 months ago
Modelling hardware verification concerns specified in the e language: an experience report
e is an aspect-oriented hardware verification language that is widely used to verify the design of electronic circuits through the development and execution of testbenches. In rec...
Darren Galpin, Cormac Driver, Siobhán Clark...
ETFA
2005
IEEE
15 years 3 months ago
Plug-and-play: bridging the semantic gap between application and transducers
Abstract – Plug-and-play is an important mechanism for achieving component integration and improving interoperability in smart transducer systems. While recent research in smart ...
Stefan Pitzek, Wilfried Elmenreich
IPPS
2007
IEEE
15 years 3 months ago
The Adaptive Code Kitchen: Flexible Tools for Dynamic Application Composition
Driven by the increasing componentization of scientific codes, the deployment of high-end system infrastructures such as the Grid, and the desire to support high level problem so...
Pilsung Kang 0002, Mike Heffner, Joy Mukherjee, Na...