Now showing items 241-260 of 364
Tejedor Saavedra, Enric (Date of defense: 2013-07-15)
The last decade has witnessed unprecedented changes in parallel and distributed infrastructures. Due to the diminished gains in processor performance from increasing clock frequency, manufacturers have moved from uniprocessor ...
Vega, Augusto J. (Date of defense: 2013-07-30)
The so-called "power (or power density) wall" has caused core frequency (and single-thread performance) to slow down, giving rise to the era of multi-core/multi-thread processors. For example, the IBM POWER4 processor, ...
Subotic, Vladimir (Date of defense: 2013-07-26)
Parallel programming is used to partition a computational problem among multiple processing units and to define how they interact (communicate and synchronize) in order to guarantee the correct result. The performance that ...
Almalkawi, Islam (Date of defense: 2013-07-23)
Wireless Multimedia Sensor Networks (WMSNs) have emerged and shifted the focus from the typical scalar wireless sensor networks to networks with multimedia devices that are capable to retrieve video, audio, images, as well ...
Gupta, Manoj (Date of defense: 2013-06-14)
Very Long Instruction Word (VLIW) processors are very popular in embedded and mobile computing domain. Use of VLIW processors range from Digital Signal Processors (DSPs) found in a plethora of communication and multimedia ...
Paredes Oliva, Ignasi (Date of defense: 2013-07-29)
Network monitoring has always been a topic of foremost importance for both network operators and researchers for multiple reasons ranging from anomaly detection to tra c classi cation or capacity planning. Nowadays, as ...
León Gutiérrez, Xavier (Date of defense: 2013-07-05)
Large scale computing infrastructures need scalable and effi cient resource allocation mechanisms to ful l the requirements of its participants and applications while the whole system is regulated to work e ciently. ...
Alaei, Mohammad (Date of defense: 2013-06-27)
In Wireless Multimedia Sensor Networks (WMSNs) the lifetime of battery operated visual nodes is limited by their energy consumption, which is proportional to the energy required for sensing, processing, and transmitting ...
González García, Juan (Date of defense: 2013-06-07)
High Performance Computing and Supercomputing is the high end area of the computing science that studies and develops the most powerful computers available. Current supercomputers are extremely complex so are the applications ...
Bieschewski, Stefan (Date of defense: 2013-06-20)
Power constraints led to the end of exponential growth in single–processor performance, which characterized the semiconductor industry for many years. Single–chip multiprocessors allowed the performance growth to continue ...
Tomić, Sasa (Date of defense: 2012-07-13)
Conventional lock-based synchronization serializes accesses to critical sections guarded by the same lock. Using multiple locks brings the possibility of a deadlock or a livelock in the program, making parallel programming ...
Madriles Gimeno, Carles (Date of defense: 2012-07-23)
In the last decade, industry made a right-hand turn and shifted towards multi-core processor designs, also known as Chip-Multi-Processors (CMPs), in order to provide further performance improvements under a reasonable power ...
Sreekar Shenoy, Govind (Date of defense: 2012-10-30)
System security is a prerequisite for efficient day-to-day transactions. As a consequence, Intrusion Detection Systems (IDS) are commonly used to provide an effective security ring to systems in a network. An IDS operates ...
Font Aragonès, Xavier (Date of defense: 2013-05-30)
Biometric Recognition refers to the automatic identification of a person based on his or her anatomical characteristic or modality (i.e., fingerprint, palmprint, face) or behavioural (i.e., signature) characteristic. It ...
Antolino Rivas, David (Date of defense: 2013-05-03)
A thorough review of the state of the art will reveal that most VANET applications rely on Public Key Infrastructure (PKI), which uses user certificates managed by a Certification Authority (CA) to handle security. By doing ...
Kestor, Gökçen (Date of defense: 2013-03-22)
Chip Multithreading (CMT) processors promise to deliver higher performance by running more than one stream of instructions in parallel. To exploit CMT's capabilities, programmers have to parallelize their applications, ...
Serna-Olvera, Jetzabel Maritza (Date of defense: 2013-01-08)
Vehicular Ad-Hoc NETworks (VANETs) are an emerging technology which aims to improve road safety by preventing and reducing traffic accidents. While VANETs offer a great variety of promising applications, such as, safety-related ...
Pedrola Escribà, Oscar (Date of defense: 2012-11-30)
Scaling traditional telecommunication networks so that they are able to cope with the volume of future traffic demands and the stringent European Commission (EC) regulations on emissions would entail unaffordable investments. ...
Reyes Ávila, Sebastian (Date of defense: 2012-11-23)
This work presents the development and experimental validation of a generic workflow model applicable to any parameter sweep problem: the Parameter Sweep Scientific Workflow (PSWF) model. As part of it, a model for the ...
García-Cervigon Gutiérrez, Manuel (Date of defense: 2012-11-02)
Financial service providers are moving many services online reducing their costs and facilitating customers¿ interaction. Unfortunately criminals have quickly found several ways to avoid most security measures applied to ...