Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
processing programs » processing programmed, processing problems, processing products
security computing » security completing, security combating, security composing
programs security » program security, problems security, programs equity
https » http
processing programs » processing programmed, processing problems, processing products
security computing » security completing, security combating, security composing
programs security » program security, problems security, programs equity
https » http
1
Published 2005
Table of Contents:
“... of Probability Distributions for MPI Point-to-Point Communication Times on Distributed Memory Parallel Computers...”View full text
Electronic
eBook
2
Published 2008
Table of Contents:
“...Smart Content Delivery on the Internet -- Parallel Query Processing in Databases on Multicore...”View full text
Electronic
eBook
3
Published 2005
Table of Contents:
“... Processing on Conventional MIMD Computers -- Parallel Implementation of Back-Propagation Neural Network...”View full text
Electronic
eBook
4
Published 2012
Table of Contents:
“... Vulnerabilities Based on Security Testing -- Small World Asynchronous Parallel Model for Genome Assembly -- UKCF...”View full text
Electronic
eBook
5
Published 2010
Table of Contents:
“...) Computations Based on GPU -- Parallel Programming, Performance Evaluation -- A Proposed Asynchronous Object...”View full text
Electronic
eBook
6
Published 2005
Table of Contents:
“... Performance Computing and Architecture -- Session 9C: Distributed Processing and Architecture....”View full text
Electronic
eBook
7
Published 2013
Table of Contents:
“...Keynotes -- Bi-Objective Optimization for Scheduling in Parallel Computing Systems -- Robust...”View full text
Electronic
eBook
8
Published 2005
Table of Contents:
“... for Irregular and Iterative I/O-Intensive Parallel Jobs -- An Extended Evaluation of Two-Phase Scheduling...”View full text
Electronic
eBook
9
Published 2005
Table of Contents:
“... 2D: Security Algorithms and Systems I -- Session 3A: High-Performance Computing and Architecture II...”View full text
Electronic
eBook
10
Published 2015
Table of Contents:
“...Trust, security and privacy for Big Data -- Trust, security and privacy for emerging applications...”View full text
Electronic
eBook
11
Published 2012
Table of Contents:
“...Accelerating the Dynamic Programming for the Optimal Polygon Triangulation on the -- Security...”View full text
Electronic
eBook
12
Published 2010
Table of Contents:
“...The 2010 International Symposium on Frontiers of Parallel and Distributed Computing (FPDC 2010...”View full text
Electronic
eBook
13
Published 2005
Table of Contents:
“... Grid Service Chain Model -- A Performance-Based Parallel Loop Self-scheduling on Grid Computing...”View full text
Electronic
eBook
14
Published 2015
Table of Contents:
“... algorithms -- Applications of parallel and distributed computing -- Service dependability and security...”View full text
Electronic
eBook
15
Published 2015
Table of Contents:
“... algorithms -- Applications of parallel and distributed computing -- Service dependability and security...”View full text
Electronic
eBook
16
Published 2015
Table of Contents:
“... algorithms -- Applications of parallel and distributed computing -- Service dependability and security...”View full text
Electronic
eBook
17
Published 2015
Table of Contents:
“... algorithms -- Applications of parallel and distributed computing -- Service dependability and security...”View full text
Electronic
eBook
18
Published 2007
Table of Contents:
“... Techniques -- A Hierarchical Programming Model for Large Parallel Interactive Applications -- Design of a...”View full text
Electronic
eBook
19
Published 2010
Table of Contents:
“...Parallel/Distributed Architectures and Mobile Computing -- Evaluating Performance of New Quad-Core...”View full text
Electronic
eBook
20
Published 2007
Table of Contents:
“...: Incorporating the DynaSOAr Framework in Distributed Query Processing -- Review of Security Models Applied...”View full text
Electronic
eBook



