We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 41-60 of 3,373 results
  1. Near-Data Prediction Based Speculative Optimization in a Distribution Environment

    Apache Hadoop is an open source software framework that supports data-intensive distributed applications and is distributed under the Apache 2.0...
    Conference paper 2020
  2. Trusted Execution Environment

    A trusted execution environment (TEE) means a secure area which can guarantee the confidentiality and integrity of the code and data inside of this...
    Jiewen Yao, Vincent Zimmer in Building Secure Firmware
    Chapter 2020
  3. DynQ: a dynamic query engine with query-reuse capabilities embedded in a polyglot runtime

    Language-integrated query (LINQ) frameworks offer a convenient programming abstraction for processing in-memory collections of data, allowing...

    Filippo Schiavio, Daniele Bonetta, Walter Binder in The VLDB Journal
    Article Open access 13 March 2023
  4. Toward High-Performance Delta-Based Iterative Processing with a Group-Based Approach

    Many systems have been built to employ the delta-based iterative execution model to support iterative algorithms on distributed platforms by...

    Hui Yu, **n-Yu Jiang, ... Hai ** in Journal of Computer Science and Technology
    Article 30 July 2022
  5. Efficient Concurrent Execution of Smart Contracts in Blockchains Using Object-Based Transactional Memory

    Several popular blockchains such as Ethereum execute complex transactions through user-defined scripts. A block of the chain typically consists of...
    Parwat Singh Anjana, Hagit Attiya, ... Archit Somani in Networked Systems
    Conference paper 2021
  6. Many-BSP: an analytical performance model for CUDA kernels

    The unknown behavior of GPUs and the differing characteristics among their generations present a serious challenge in the analysis and optimization...

    Ali Riahi, Abdorreza Savadi, Mahmoud Naghibzadeh in Computing
    Article 26 February 2024
  7. Software Mitigation of RISC-V Spectre Attacks

    Speculative attacks are still an active threat today that, even if initially focused on the x86 platform, reach across all modern hardware...
    Conference paper 2024
  8. An Efficient Fault Tolerance Strategy for Multi-task MapReduce Models Using Coded Distributed Computing

    MapReduce is a programming framework designed for processing and analyzing large volumes of data in a distributed computing environment. Despite its...
    Zaipeng **e, Jianan Zhang, ... WenZhan Song in Algorithms and Architectures for Parallel Processing
    Conference paper 2024
  9. Gras** AI: experiential exercises for designers

    Artificial intelligence (AI) and machine learning (ML) are increasingly integrated into the functioning of physical and digital products, creating...

    Dave Murray-Rust, Maria Luce Lupetti, ... Wouter van der Hoog in AI & SOCIETY
    Article Open access 30 October 2023
  10. Proactive Task Offloading for Load Balancing in Iterative Applications

    Load imbalance is often a challenge for applications in parallel systems. Static cost models and pre-partitioning algorithms distribute the load at...
    Minh Thanh Chung, Josef Weidendorfer, ... Dieter Kranzlmüller in Parallel Processing and Applied Mathematics
    Conference paper Open access 2023
  11. Improving quantum-to-classical data decoding using optimized quantum wavelet transform

    One of the challenges facing current noisy-intermediate-scale-quantum devices is achieving efficient quantum circuit measurement or readout. The...

    Mingyoung Jeng, SM Ishraq Ul Islam, ... Esam El-Araby in The Journal of Supercomputing
    Article 16 June 2023
  12. ATConf: auto-tuning high dimensional configuration parameters for big data processing frameworks

    To support various application scenarios, big data processing frameworks (BDPFs) such as Spark usually provide users with a large number of...

    Hui Dou, Kang Wang, ... Pengfei Chen in Cluster Computing
    Article 14 October 2022
  13. NoC-based hardware software co-design framework for dataflow thread management

    Applications running in a large and complex manycore system can significantly benefit from adopting the dataflow model of computation. In a dataflow...

    Somnath Mazumdar, Alberto Scionti, ... Antoni Portero in The Journal of Supercomputing
    Article Open access 11 May 2023
  14. Verifying Secure Speculation in Isabelle/HOL

    Secure speculation is an information flow security hyperproperty that prevents transient execution attacks such as Spectre, Meltdown and Foreshadow....
    Matt Griffin, Brijesh Dongol in Formal Methods
    Conference paper 2021
  15. Recognizing MapReduce Straggler Tasks in Big Data Infrastructures Using Artificial Neural Networks

    MapReduce framework is used for the distribution and parallelization of large-scale data processing. This framework breaks a job into several...

    Mandana Farhang, Faramarz Safi-Esfahani in Journal of Grid Computing
    Article 30 March 2020
  16. Deep Hawkes process for high-frequency market making

    High-frequency market making is a liquidity-providing trading strategy that simultaneously generates many bids and asks for a security at ultra-low...

    Article Open access 26 April 2024
  17. Detection of Intrusions and Malware, and Vulnerability Assessment 18th International Conference, DIMVA 2021, Virtual Event, July 14–16, 2021, Proceedings

    This book constitutes the proceedings of the 18th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment,...
    Leyla Bilge, Lorenzo Cavallaro, ... Nuno Neves in Lecture Notes in Computer Science
    Conference proceedings 2021
  18. Subresultant Chains Using Bézout Matrices

    Subresultant chains over rings of multivariate polynomials are calculated using a speculative approach based on the Bézout matrix. Our experimental...
    Mohammadali Asadi, Alexander Brandt, ... Marc Moreno Maza in Computer Algebra in Scientific Computing
    Conference paper 2022
  19. Computer-Aided Reverse Engineering of Protected Software

    Reverse engineering is undoing or circumventing the protections deployed on a code region. Software crackers perform this to remove license checks in...
    Daniele Canavese, Leonardo Regano, Antonio Lioy in Digital Sovereignty in Cyber Security: New Challenges in Future Vision
    Conference paper 2023
  20. A classification of hadoop job schedulers based on performance optimization approaches

    Job scheduling in MapReduce plays a vital role in Hadoop performance. In recent years, many researchers have presented job scheduler algorithms to...

    Rana Ghazali, Sahar Adabi, ... Ali Movaghar in Cluster Computing
    Article 18 June 2021
Did you find what you were looking for? Share feedback.