Ara mostrant els elements 241-260 de 364

    Programming and parallelising applications for distributed infrastructures 

    Tejedor Saavedra, Enric (Data de defensa: 2013-07-15)

    The last decade has witnessed unprecedented changes in parallel and distributed infrastructures. Due to the diminished gains in processor performance from increasing clock frequency, manufacturers have moved from uniprocessor ...

    Performance and power optimizations in chip multiprocessors for throughput-aware computation 

    Vega, Augusto J. (Data de defensa: 2013-07-30)

    The so-called "power (or power density) wall" has caused core frequency (and single-thread performance) to slow down, giving rise to the era of multi-core/multi-thread processors. For example, the IBM POWER4 processor, ...

    Evaluating techniques for parallelization tuning in MPI, OmpSs and MPI/OmpSs 

    Subotic, Vladimir (Data de defensa: 2013-07-26)

    Parallel programming is used to partition a computational problem among multiple processing units and to define how they interact (communicate and synchronize) in order to guarantee the correct result. The performance that ...

    Wireless multimedia sensor networks, security and key management 

    Almalkawi, Islam (Data de defensa: 2013-07-23)

    Wireless Multimedia Sensor Networks (WMSNs) have emerged and shifted the focus from the typical scalar wireless sensor networks to networks with multimedia devices that are capable to retrieve video, audio, images, as well ...

    Improving multithreading performance for clustered VLIW architectures. 

    Gupta, Manoj (Data de defensa: 2013-06-14)

    Very Long Instruction Word (VLIW) processors are very popular in embedded and mobile computing domain. Use of VLIW processors range from Digital Signal Processors (DSPs) found in a plethora of communication and multimedia ...

    Addressing practical challenges for anomaly detection in backbone networks 

    Paredes Oliva, Ignasi (Data de defensa: 2013-07-29)

    Network monitoring has always been a topic of foremost importance for both network operators and researchers for multiple reasons ranging from anomaly detection to tra c classi cation or capacity planning. Nowadays, as ...

    Economic regulation for multi tenant infrastructures 

    León Gutiérrez, Xavier (Data de defensa: 2013-07-05)

    Large scale computing infrastructures need scalable and effi cient resource allocation mechanisms to ful l the requirements of its participants and applications while the whole system is regulated to work e ciently. ...

    Energy efficient cooperative node management for wireless multimedia sensor networks 

    Alaei, Mohammad (Data de defensa: 2013-06-27)

    In Wireless Multimedia Sensor Networks (WMSNs) the lifetime of battery operated visual nodes is limited by their energy consumption, which is proportional to the energy required for sensing, processing, and transmitting ...

    Application of clustering analysis and sequence analysis on the performance analysis of parallel applications 

    González García, Juan (Data de defensa: 2013-06-07)

    High Performance Computing and Supercomputing is the high end area of the computing science that studies and develops the most powerful computers available. Current supercomputers are extremely complex so are the applications ...

    Design of a distributed memory unit for clustered microarchitectures 

    Bieschewski, Stefan (Data de defensa: 2013-06-20)

    Power constraints led to the end of exponential growth in single–processor performance, which characterized the semiconductor industry for many years. Single–chip multiprocessors allowed the performance growth to continue ...

    Towards lightweight and high-performance hardware transactional memory 

    Tomić, Sasa (Data de defensa: 2012-07-13)

    Conventional lock-based synchronization serializes accesses to critical sections guarded by the same lock. Using multiple locks brings the possibility of a deadlock or a livelock in the program, making parallel programming ...

    Mitosis based speculative multithreaded architectures 

    Madriles Gimeno, Carles (Data de defensa: 2012-07-23)

    In the last decade, industry made a right-hand turn and shifted towards multi-core processor designs, also known as Chip-Multi-Processors (CMPs), in order to provide further performance improvements under a reasonable power ...

    Architecture support for intrusion detection systems 

    Sreekar Shenoy, Govind (Data de defensa: 2012-10-30)

    System security is a prerequisite for efficient day-to-day transactions. As a consequence, Intrusion Detection Systems (IDS) are commonly used to provide an effective security ring to systems in a network. An IDS operates ...

    Visible, near infrared and thermal hand-based image biometric recognition 

    Font Aragonès, Xavier (Data de defensa: 2013-05-30)

    Biometric Recognition refers to the automatic identification of a person based on his or her anatomical characteristic or modality (i.e., fingerprint, palmprint, face) or behavioural (i.e., signature) characteristic. It ...

    Reputation systems and secure communication in vehicular networks 

    Antolino Rivas, David (Data de defensa: 2013-05-03)

    A thorough review of the state of the art will reveal that most VANET applications rely on Public Key Infrastructure (PKI), which uses user certificates managed by a Certification Authority (CA) to handle security. By doing ...

    Enhancing the efficiency and practicality of software transactional memory on massively multithreaded systems 

    Kestor, Gökçen (Data de defensa: 2013-03-22)

    Chip Multithreading (CMT) processors promise to deliver higher performance by running more than one stream of instructions in parallel. To exploit CMT's capabilities, programmers have to parallelize their applications, ...

    A trust-driven privacy architecture for vehicular ad-hoc networks 

    Serna-Olvera, Jetzabel Maritza (Data de defensa: 2013-01-08)

    Vehicular Ad-Hoc NETworks (VANETs) are an emerging technology which aims to improve road safety by preventing and reducing traffic accidents. While VANETs offer a great variety of promising applications, such as, safety-related ...

    Cross-layer modeling and optimization of next-generation internet networks 

    Pedrola Escribà, Oscar (Data de defensa: 2012-11-30)

    Scaling traditional telecommunication networks so that they are able to cope with the volume of future traffic demands and the stringent European Commission (EC) regulations on emissions would entail unaffordable investments. ...

    Desarrollo de un workflow genérico para el modelado de problemas de barrido paramétrico en sistemas distribuidos 

    Reyes Ávila, Sebastian (Data de defensa: 2012-11-23)

    This work presents the development and experimental validation of a generic workflow model applicable to any parameter sweep problem: the Parameter Sweep Scientific Workflow (PSWF) model. As part of it, a model for the ...

    Distributed detection of anomalous internet sessions 

    García-Cervigon Gutiérrez, Manuel (Data de defensa: 2012-11-02)

    Financial service providers are moving many services online reducing their costs and facilitating customers¿ interaction. Unfortunately criminals have quickly found several ways to avoid most security measures applied to ...