• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 32,846
Next 10 →

Network Based Computing Lab

by unknown authors
"... InfiniBand is becoming increasingly popular in the area of cluster computing due to its open standard and high performance. I/O interfaces like PCI-Express and GX+ are being introduced as next generation technologies to drive InfiniBand with very high throughput. HCAs with throughput of 8x on PCI-Ex ..."
Abstract - Add to MetaCart
InfiniBand is becoming increasingly popular in the area of cluster computing due to its open standard and high performance. I/O interfaces like PCI-Express and GX+ are being introduced as next generation technologies to drive InfiniBand with very high throughput. HCAs with throughput of 8x on PCI

Network Based Computing Lab

by unknown authors
"... InfiniBand is becoming increasingly popular in the area of cluster computing due to its open standard and high performance. I/O interfaces like PCI-Express and GX+ are being introduced as next generation technologies to drive InfiniBand with very high throughput. HCAs with throughput of 8x on PCI-Ex ..."
Abstract - Add to MetaCart
InfiniBand is becoming increasingly popular in the area of cluster computing due to its open standard and high performance. I/O interfaces like PCI-Express and GX+ are being introduced as next generation technologies to drive InfiniBand with very high throughput. HCAs with throughput of 8x on PCI

Java for High-Performance Network-Based Computing: A Survey

by M. Lobosco, C. Amorim, O. Loques , 2002
"... this paper is organized as follows. In Section 2, we describe the basic support for concurrent computing/programming provided by Java, as well as some other features that are relevant to understand the proposals described here. Readers that are familiar with Java's concurrency features can skip ..."
Abstract - Cited by 4 (0 self) - Add to MetaCart
skip this section. In Section 3, we describe the parameters chosen to classify each of the selected projects. In Section 4, we describe the Java environments and mechanisms for supporting high-performance network-based computing that were included in this survey. Section 5 presents a classi cation

A Network Status Predictor to Support Dynamic Scheduling in Network-Based Computing Systems

by Junseong Kim, David J. Lilja - in IPPS/SPDP Proc , 1998
"... The management of networks has often been ignored in network-based computing systems due to the difficulty of es-timating application programs ’ network latency and band-width requirements, and the difficulty of predicting the sys-tem network load. To help address this deficiency, and thereby suppor ..."
Abstract - Cited by 4 (0 self) - Add to MetaCart
The management of networks has often been ignored in network-based computing systems due to the difficulty of es-timating application programs ’ network latency and band-width requirements, and the difficulty of predicting the sys-tem network load. To help address this deficiency, and thereby

Towards an Active Network Architecture

by David L. Tennenhouse, David J. Wetherall - Computer Communication Review , 1996
"... Active networks allow their users to inject customized programs into the nodes of the network. An extreme case, in which we are most interested, replaces packets with "capsules" -- program fragments that are executed at each network router/switch they traverse. Active architectures permit ..."
Abstract - Cited by 497 (7 self) - Add to MetaCart
a massive increase in the sophistication of the computation that is performed within the network. They will enable new applications, especially those based on application-specific multicast, information fusion, and other services that leverage network-based computation and storage. Furthermore

Predicting Internet Network Distance with Coordinates-Based Approaches

by T. S. Eugene Ng, Hui Zhang - In INFOCOM , 2001
"... In this paper, we propose to use coordinates-based mechanisms in a peer-to-peer architecture to predict Internet network distance (i.e. round-trip propagation and transmission delay) . We study two mechanisms. The first is a previously proposed scheme, called the triangulated heuristic, which is bas ..."
Abstract - Cited by 631 (6 self) - Add to MetaCart
is based on relative coordinates that are simply the distances from a host to some special network nodes. We propose the second mechanism, called Global Network Positioning (GNP), which is based on absolute coordinates computed from modeling the Internet as a geometric space. Since end hosts maintain

CONCURRENCY--PRACTICE AND EXPERIENCE Concurrency: Pract. Exper. 2001; 00:1-6 Prepared using cpeauth.cls [Version: 2001/03/05 v2.01] Java for High-Performance Network-Based Computing: A Survey

by M. Lobosco, C. Amorim
"... 1. INTRODUCTION Java [4] is an object-oriented programming language, developed by Sun Microsystems, which incorporates features such as multithreading and primitives for concurrent programming. One ..."
Abstract - Add to MetaCart
1. INTRODUCTION Java [4] is an object-oriented programming language, developed by Sun Microsystems, which incorporates features such as multithreading and primitives for concurrent programming. One

Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems

by Paul C. Kocher , 1996
"... By carefully measuring the amount of time required to perform private key operations, attackers may be able to find fixed Diffie-Hellman exponents, factor RSA keys, and break other cryptosystems. Against a vulnerable system, the attack is computationally inexpensive and often requires only known cip ..."
Abstract - Cited by 651 (3 self) - Add to MetaCart
ciphertext. Actual systems are potentially at risk, including cryptographic tokens, network-based cryptosystems, and other applications where attackers can make reasonably accurate timing measurements. Techniques for preventing the attack for RSA and Diffie-Hellman are presented. Some cryptosystems will need

The KEGG resource for deciphering the genome

by Minoru Kanehisa, Susumu Goto, Shuichi Kawashima, Yasushi Okuno, Masahiro Hattori - Nucleic Acids Res , 2004
"... A grand challenge in the post-genomic era is a complete computer representation of the cell and the organism, which will enable computational prediction of higher-level complexity of cellular processes and organism behavior from genomic information. Toward this end we have been developing a knowledg ..."
Abstract - Cited by 513 (24 self) - Add to MetaCart
knowledge-based approach for network prediction, which is to predict, given a complete set of genes in the genome, the protein interaction networks that are responsible for various cellular processes. KEGG at

Active Learning with Statistical Models

by David A. Cohn, Zoubin Ghahramani, Michael I. Jordan , 1995
"... For manytypes of learners one can compute the statistically "optimal" way to select data. We review how these techniques have been used with feedforward neural networks [MacKay, 1992# Cohn, 1994]. We then showhow the same principles may be used to select data for two alternative, statist ..."
Abstract - Cited by 679 (10 self) - Add to MetaCart
For manytypes of learners one can compute the statistically "optimal" way to select data. We review how these techniques have been used with feedforward neural networks [MacKay, 1992# Cohn, 1994]. We then showhow the same principles may be used to select data for two alternative
Next 10 →
Results 1 - 10 of 32,846
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University