Ara mostrant els elements 221-240 de 260

    Business-driven resource allocation and management for data centres in cloud computing markets 

    Macias Lloret, Mario (Data de defensa: 2014-05-28)

    Cloud Computing markets arise as an efficient way to allocate resources for the execution of tasks and services within a set of geographically dispersed providers from different organisations. Client applications and service ...

    On the scalability limits of communication networks to the nanoscale 

    Llatser Martí, Ignacio (Data de defensa: 2014-01-17)

    Nanosystems, integrated systems with a total size of a few micrometers, are capable of interacting at the nanoscale, but their short operating range limits their usefulness in practical macro-scale scenarios. Nanonetworks, ...

    Reliability in the face of variability in nanometer embedded memories 

    Ganapathy, Shrikanth (Data de defensa: 2014-04-28)

    In this thesis, we have investigated the impact of parametric variations on the behaviour of one performance-critical processor structure - embedded memories. As variations manifest as a spread in power and performance, ...

    Optimization techniques for fine-grained communication in PGAS environments 

    Alvanos, Michail (Data de defensa: 2013-12-10)

    Partitioned Global Address Space (PGAS) languages promise to deliver improved programmer productivity and good performance in large-scale parallel machines. However, adequate performance for applications that rely on ...

    Improving the effective use of multithreaded architectures : implications on compilation, thread assignment, and timing analysis 

    Radojković, Petar (Data de defensa: 2013-07-19)

    This thesis presents cross-domain approaches that improve the effective use of multithreaded architectures. The contributions of the thesis can be classified in three groups. First, we propose several methods for thread ...

    Improved self-management of datacenter systems applying machine learning 

    Berral García, Josep Lluís (Data de defensa: 2013-11-22)

    Autonomic Computing is a Computer Science and Technologies research area, originated during mid 2000's. It focuses on optimization and improvement of complex distributed computing systems through self-control and ...

    File system metadata virtualization 

    Artiaga Amouroux, Ernest (Data de defensa: 2014-01-17)

    The advance of computing systems has brought new ways to use and access the stored data that push the architecture of traditional file systems to its limits, making them inadequate to handle the new needs. Current challenges ...

    Numerical solution of 3-D electromagnetic problems in exploration geophysics and its implementation on massively parallel computers 

    Koldan, Jelena (Data de defensa: 2013-10-30)

    The growing significance, technical development and employment of electromagnetic (EM) methods in exploration geophysics have led to the increasing need for reliable and fast techniques of interpretation of 3-D EM data ...

    Descubrimiento de servicios tolerante a fallos basado en hipercubos para sistemas distribuidos de gran escala 

    Gallardo Gómez, Antonia (Data de defensa: 2013-10-07)

    Current distributed systems that are capable of sharing resources in a distributed manner are experiencing an increase in their use and scope.This increased use in various application areas is largely due to the low cost ...

    Programming and parallelising applications for distributed infrastructures 

    Tejedor Saavedra, Enric (Data de defensa: 2013-07-15)

    The last decade has witnessed unprecedented changes in parallel and distributed infrastructures. Due to the diminished gains in processor performance from increasing clock frequency, manufacturers have moved from uniprocessor ...

    Performance and power optimizations in chip multiprocessors for throughput-aware computation 

    Vega, Augusto J. (Data de defensa: 2013-07-30)

    The so-called "power (or power density) wall" has caused core frequency (and single-thread performance) to slow down, giving rise to the era of multi-core/multi-thread processors. For example, the IBM POWER4 processor, ...

    Evaluating techniques for parallelization tuning in MPI, OmpSs and MPI/OmpSs 

    Subotic, Vladimir (Data de defensa: 2013-07-26)

    Parallel programming is used to partition a computational problem among multiple processing units and to define how they interact (communicate and synchronize) in order to guarantee the correct result. The performance that ...

    Wireless multimedia sensor networks, security and key management 

    Almalkawi, Islam (Data de defensa: 2013-07-23)

    Wireless Multimedia Sensor Networks (WMSNs) have emerged and shifted the focus from the typical scalar wireless sensor networks to networks with multimedia devices that are capable to retrieve video, audio, images, as well ...

    Addressing practical challenges for anomaly detection in backbone networks 

    Paredes Oliva, Ignasi (Data de defensa: 2013-07-29)

    Network monitoring has always been a topic of foremost importance for both network operators and researchers for multiple reasons ranging from anomaly detection to tra c classi cation or capacity planning. Nowadays, as ...

    Economic regulation for multi tenant infrastructures 

    León Gutiérrez, Xavier (Data de defensa: 2013-07-05)

    Large scale computing infrastructures need scalable and effi cient resource allocation mechanisms to ful l the requirements of its participants and applications while the whole system is regulated to work e ciently. ...

    Energy efficient cooperative node management for wireless multimedia sensor networks 

    Alaei, Mohammad (Data de defensa: 2013-06-27)

    In Wireless Multimedia Sensor Networks (WMSNs) the lifetime of battery operated visual nodes is limited by their energy consumption, which is proportional to the energy required for sensing, processing, and transmitting ...

    Towards lightweight and high-performance hardware transactional memory 

    Tomić, Sasa (Data de defensa: 2012-07-13)

    Conventional lock-based synchronization serializes accesses to critical sections guarded by the same lock. Using multiple locks brings the possibility of a deadlock or a livelock in the program, making parallel programming ...

    Architecture support for intrusion detection systems 

    Sreekar Shenoy, Govind (Data de defensa: 2012-10-30)

    System security is a prerequisite for efficient day-to-day transactions. As a consequence, Intrusion Detection Systems (IDS) are commonly used to provide an effective security ring to systems in a network. An IDS operates ...

    Visible, near infrared and thermal hand-based image biometric recognition 

    Font Aragonès, Xavier (Data de defensa: 2013-05-30)

    Biometric Recognition refers to the automatic identification of a person based on his or her anatomical characteristic or modality (i.e., fingerprint, palmprint, face) or behavioural (i.e., signature) characteristic. It ...

    Reputation systems and secure communication in vehicular networks 

    Antolino Rivas, David (Data de defensa: 2013-05-03)

    A thorough review of the state of the art will reveal that most VANET applications rely on Public Key Infrastructure (PKI), which uses user certificates managed by a Certification Authority (CA) to handle security. By doing ...