Mostrando ítems 241-260 de 364
Tejedor Saavedra, Enric (Fecha de defensa: 2013-07-15)
The last decade has witnessed unprecedented changes in parallel and distributed infrastructures. Due to the diminished gains in processor performance from increasing clock frequency, manufacturers have moved from uniprocessor ...
Vega, Augusto J. (Fecha de defensa: 2013-07-30)
The so-called "power (or power density) wall" has caused core frequency (and single-thread performance) to slow down, giving rise to the era of multi-core/multi-thread processors. For example, the IBM POWER4 processor, ...
Subotic, Vladimir (Fecha de defensa: 2013-07-26)
Parallel programming is used to partition a computational problem among multiple processing units and to define how they interact (communicate and synchronize) in order to guarantee the correct result. The performance that ...
Almalkawi, Islam (Fecha de defensa: 2013-07-23)
Wireless Multimedia Sensor Networks (WMSNs) have emerged and shifted the focus from the typical scalar wireless sensor networks to networks with multimedia devices that are capable to retrieve video, audio, images, as well ...
Gupta, Manoj (Fecha de defensa: 2013-06-14)
Very Long Instruction Word (VLIW) processors are very popular in embedded and mobile computing domain. Use of VLIW processors range from Digital Signal Processors (DSPs) found in a plethora of communication and multimedia ...
Paredes Oliva, Ignasi (Fecha de defensa: 2013-07-29)
Network monitoring has always been a topic of foremost importance for both network operators and researchers for multiple reasons ranging from anomaly detection to tra c classi cation or capacity planning. Nowadays, as ...
León Gutiérrez, Xavier (Fecha de defensa: 2013-07-05)
Large scale computing infrastructures need scalable and effi cient resource allocation mechanisms to ful l the requirements of its participants and applications while the whole system is regulated to work e ciently. ...
Alaei, Mohammad (Fecha de defensa: 2013-06-27)
In Wireless Multimedia Sensor Networks (WMSNs) the lifetime of battery operated visual nodes is limited by their energy consumption, which is proportional to the energy required for sensing, processing, and transmitting ...
González García, Juan (Fecha de defensa: 2013-06-07)
High Performance Computing and Supercomputing is the high end area of the computing science that studies and develops the most powerful computers available. Current supercomputers are extremely complex so are the applications ...
Bieschewski, Stefan (Fecha de defensa: 2013-06-20)
Power constraints led to the end of exponential growth in single–processor performance, which characterized the semiconductor industry for many years. Single–chip multiprocessors allowed the performance growth to continue ...
Tomić, Sasa (Fecha de defensa: 2012-07-13)
Conventional lock-based synchronization serializes accesses to critical sections guarded by the same lock. Using multiple locks brings the possibility of a deadlock or a livelock in the program, making parallel programming ...
Madriles Gimeno, Carles (Fecha de defensa: 2012-07-23)
In the last decade, industry made a right-hand turn and shifted towards multi-core processor designs, also known as Chip-Multi-Processors (CMPs), in order to provide further performance improvements under a reasonable power ...
Sreekar Shenoy, Govind (Fecha de defensa: 2012-10-30)
System security is a prerequisite for efficient day-to-day transactions. As a consequence, Intrusion Detection Systems (IDS) are commonly used to provide an effective security ring to systems in a network. An IDS operates ...
Font Aragonès, Xavier (Fecha de defensa: 2013-05-30)
Biometric Recognition refers to the automatic identification of a person based on his or her anatomical characteristic or modality (i.e., fingerprint, palmprint, face) or behavioural (i.e., signature) characteristic. It ...
Antolino Rivas, David (Fecha de defensa: 2013-05-03)
A thorough review of the state of the art will reveal that most VANET applications rely on Public Key Infrastructure (PKI), which uses user certificates managed by a Certification Authority (CA) to handle security. By doing ...
Kestor, Gökçen (Fecha de defensa: 2013-03-22)
Chip Multithreading (CMT) processors promise to deliver higher performance by running more than one stream of instructions in parallel. To exploit CMT's capabilities, programmers have to parallelize their applications, ...
Serna-Olvera, Jetzabel Maritza (Fecha de defensa: 2013-01-08)
Vehicular Ad-Hoc NETworks (VANETs) are an emerging technology which aims to improve road safety by preventing and reducing traffic accidents. While VANETs offer a great variety of promising applications, such as, safety-related ...
Pedrola Escribà, Oscar (Fecha de defensa: 2012-11-30)
Scaling traditional telecommunication networks so that they are able to cope with the volume of future traffic demands and the stringent European Commission (EC) regulations on emissions would entail unaffordable investments. ...
Reyes Ávila, Sebastian (Fecha de defensa: 2012-11-23)
This work presents the development and experimental validation of a generic workflow model applicable to any parameter sweep problem: the Parameter Sweep Scientific Workflow (PSWF) model. As part of it, a model for the ...
García-Cervigon Gutiérrez, Manuel (Fecha de defensa: 2012-11-02)
Financial service providers are moving many services online reducing their costs and facilitating customers¿ interaction. Unfortunately criminals have quickly found several ways to avoid most security measures applied to ...