Ara mostrant els elements 221-240 de 260
Macias Lloret, Mario (Data de defensa: 2014-05-28)
Cloud Computing markets arise as an efficient way to allocate resources for the execution of tasks and services within a set of geographically dispersed providers from different organisations. Client applications and service ...
Llatser Martí, Ignacio (Data de defensa: 2014-01-17)
Nanosystems, integrated systems with a total size of a few micrometers, are capable of interacting at the nanoscale, but their short operating range limits their usefulness in practical macro-scale scenarios. Nanonetworks, ...
Ganapathy, Shrikanth (Data de defensa: 2014-04-28)
In this thesis, we have investigated the impact of parametric variations on the behaviour of one performance-critical processor structure - embedded memories. As variations manifest as a spread in power and performance, ...
Alvanos, Michail (Data de defensa: 2013-12-10)
Partitioned Global Address Space (PGAS) languages promise to deliver improved programmer productivity and good performance in large-scale parallel machines. However, adequate performance for applications that rely on ...
Radojković, Petar (Data de defensa: 2013-07-19)
This thesis presents cross-domain approaches that improve the effective use of multithreaded architectures. The contributions of the thesis can be classified in three groups. First, we propose several methods for thread ...
Berral García, Josep Lluís (Data de defensa: 2013-11-22)
Autonomic Computing is a Computer Science and Technologies research area, originated during mid 2000's. It focuses on optimization and improvement of complex distributed computing systems through self-control and ...
Artiaga Amouroux, Ernest (Data de defensa: 2014-01-17)
The advance of computing systems has brought new ways to use and access the stored data that push the architecture of traditional file systems to its limits, making them inadequate to handle the new needs. Current challenges ...
Koldan, Jelena (Data de defensa: 2013-10-30)
The growing significance, technical development and employment of electromagnetic (EM) methods in exploration geophysics have led to the increasing need for reliable and fast techniques of interpretation of 3-D EM data ...
Gallardo Gómez, Antonia (Data de defensa: 2013-10-07)
Current distributed systems that are capable of sharing resources in a distributed manner are experiencing an increase in their use and scope.This increased use in various application areas is largely due to the low cost ...
Tejedor Saavedra, Enric (Data de defensa: 2013-07-15)
The last decade has witnessed unprecedented changes in parallel and distributed infrastructures. Due to the diminished gains in processor performance from increasing clock frequency, manufacturers have moved from uniprocessor ...
Vega, Augusto J. (Data de defensa: 2013-07-30)
The so-called "power (or power density) wall" has caused core frequency (and single-thread performance) to slow down, giving rise to the era of multi-core/multi-thread processors. For example, the IBM POWER4 processor, ...
Subotic, Vladimir (Data de defensa: 2013-07-26)
Parallel programming is used to partition a computational problem among multiple processing units and to define how they interact (communicate and synchronize) in order to guarantee the correct result. The performance that ...
Almalkawi, Islam (Data de defensa: 2013-07-23)
Wireless Multimedia Sensor Networks (WMSNs) have emerged and shifted the focus from the typical scalar wireless sensor networks to networks with multimedia devices that are capable to retrieve video, audio, images, as well ...
Paredes Oliva, Ignasi (Data de defensa: 2013-07-29)
Network monitoring has always been a topic of foremost importance for both network operators and researchers for multiple reasons ranging from anomaly detection to tra c classi cation or capacity planning. Nowadays, as ...
León Gutiérrez, Xavier (Data de defensa: 2013-07-05)
Large scale computing infrastructures need scalable and effi cient resource allocation mechanisms to ful l the requirements of its participants and applications while the whole system is regulated to work e ciently. ...
Alaei, Mohammad (Data de defensa: 2013-06-27)
In Wireless Multimedia Sensor Networks (WMSNs) the lifetime of battery operated visual nodes is limited by their energy consumption, which is proportional to the energy required for sensing, processing, and transmitting ...
Tomić, Sasa (Data de defensa: 2012-07-13)
Conventional lock-based synchronization serializes accesses to critical sections guarded by the same lock. Using multiple locks brings the possibility of a deadlock or a livelock in the program, making parallel programming ...
Sreekar Shenoy, Govind (Data de defensa: 2012-10-30)
System security is a prerequisite for efficient day-to-day transactions. As a consequence, Intrusion Detection Systems (IDS) are commonly used to provide an effective security ring to systems in a network. An IDS operates ...
Font Aragonès, Xavier (Data de defensa: 2013-05-30)
Biometric Recognition refers to the automatic identification of a person based on his or her anatomical characteristic or modality (i.e., fingerprint, palmprint, face) or behavioural (i.e., signature) characteristic. It ...
Antolino Rivas, David (Data de defensa: 2013-05-03)
A thorough review of the state of the art will reveal that most VANET applications rely on Public Key Infrastructure (PKI), which uses user certificates managed by a Certification Authority (CA) to handle security. By doing ...