找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information Systems Architecture and Technology: Proceedings of 37th International Conference on Inf; Adam Grzech,Jerzy Świątek,Leszek Bor

[复制链接]
楼主: PLY
发表于 2025-3-23 10:37:50 | 显示全部楼层
A Fail-Safe NVRAM Based Mechanism for Efficient Creation and Recovery of Data Copies in Parallel MPIe target a cluster environment in which each node has an NVRAM installed in it. Our previously developed extension to the MPI I/O API can take advantage of NVRAM regions in order to provide an NVRAM based cache like mechanism to significantly speed up I/O operations and allow to preload large files
发表于 2025-3-23 15:38:57 | 显示全部楼层
发表于 2025-3-23 18:01:32 | 显示全部楼层
Transient Processing Analysis in a Finite-Buffer Queueing Model with Setup Timesestarts the operation after the idle period, a random-length setup time is needed to achieve full readiness for the work, during which the service process is suspended. A system of integral equations for time-dependent departure process, conditioned by the initial buffer state, is built. The solutio
发表于 2025-3-23 22:29:12 | 显示全部楼层
Analysis of Routing Protocols Metrics for Wireless Mesh Networksprotocols are crucial element for performance of mesh networks, they ensure even flow of data packets and reduce negative influence of interferences. The article contains an overview of routing protocols used in the network mesh. As part of the research includes a comparative analysis of representat
发表于 2025-3-24 03:51:33 | 显示全部楼层
Energy Efficient Dynamic Load Balancing in Multipath TCP for Mobile Devices the communication purposes. On the other hand, a variant of TCP that allows for simultaneous transmission over different paths has been developed. This paper addresses the problem of optimal load distribution among the interfaces available at a networking device, e.g. mobile phone, with the objecti
发表于 2025-3-24 10:20:19 | 显示全部楼层
发表于 2025-3-24 14:44:17 | 显示全部楼层
of detecting and removing it. This is especially so for video conferencing, thin-client computing and Internet cafes...CryptoGraphics: Exploiting Graphics Cards for Security. explores the potential for implementing ciphers within GPUs, and describes the relevance of GPU-based encryption to the secur
发表于 2025-3-24 14:56:36 | 显示全部楼层
发表于 2025-3-24 19:59:17 | 显示全部楼层
发表于 2025-3-25 02:43:11 | 显示全部楼层
Viktor Melnyk,Ivan Lopitof detecting and removing it. This is especially so for video conferencing, thin-client computing and Internet cafes...CryptoGraphics: Exploiting Graphics Cards for Security. explores the potential for implementing ciphers within GPUs, and describes the relevance of GPU-based encryption to the secur
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-16 04:11
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表