Sciweavers

96
Voted
IPPS
2008
IEEE
15 years 7 months ago
Receiver-initiated message passing over RDMA Networks
Providing point-to-point messaging-passing semantics atop Put/Get hardware traditionally involves implementing a protocol comprising three network latencies. In this paper, we ana...
Scott Pakin
95
Voted
IPPS
2008
IEEE
15 years 7 months ago
SLA-based resource allocation in cluster computing systems
Resource allocation is a fundamental but challenging problem due to the complexity of cluster computing systems. In enterprise service computing, resource allocation is often asso...
Kaiqi Xiong, Harry G. Perros
109
Voted
IPPS
2008
IEEE
15 years 7 months ago
Formal modeling and analysis of real-time resource-sharing protocols in Real-Time Maude
This paper presents general techniques for formally modeling, simulating, and model checking real-time resource-sharing protocols in Real-Time Maude. The “scheduling subset” o...
Peter Csaba Ölveczky, Pavithra Prabhakar, Xue...
48
Voted
IPPS
2008
IEEE
15 years 7 months ago
An efficient, model-based CPU-GPU heterogeneous FFT library
Yasuhiko Ogata, Toshio Endo, Naoya Maruyama, Satos...
77
Voted
IPPS
2008
IEEE
15 years 7 months ago
Optimal spot-checking to minimize the computation time in volunteer computing
This paper proposes an optimization technique for spotchecking to minimize the computation time of volunteer computing (VC) systems with malicious participants who return erroneou...
Kan Watanabe, Masaru Fukushi, Susumu Horiguchi
85
Voted
IPPS
2008
IEEE
15 years 7 months ago
A scalable configurable architecture for the massively parallel GCA model
Johannes Jendrsczok, Patrick Ediger, Rolf Hoffmann
93
Voted
IPPS
2008
IEEE
15 years 7 months ago
Modeling and analysis of power in multicore network processors
With the emergence of multicore network processors in support of high-performance computing and networking applications, power consumption has become a problem of increasing signi...
S. Huang, Y. Luo, W. Feng
102
Voted
IPPS
2008
IEEE
15 years 7 months ago
CoSL: A coordinated statistical learning approach to measuring the capacity of multi-tier websites
Website capacity determination is crucial to measurement-based access control, because it determines when to turn away excessive client requests to guarantee consistent service qu...
Jia Rao, Cheng-Zhong Xu
127
Voted
IPPS
2008
IEEE
15 years 7 months ago
Adaptive and dynamic intrusion detection by means of idiotypic networks paradigm
—In this paper we present a novel intrusion detection architecture based on Idiotypic Network Theory (INIDS), that aims at dealing with large scale network attacks featuring vari...
Marek Ostaszewski, Pascal Bouvry, Franciszek Sered...
119
Voted
IPPS
2008
IEEE
15 years 7 months ago
Outlier detection in performance data of parallel applications
— When an adaptive software component is employed to select the best-performing implementation for a communication operation at runtime, the correctness of the decision taken str...
Katharina Benkert, Edgar Gabriel, Michael M. Resch