Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

39 results
Image document

APP-LRU: A New Page Replacement Method for PCM/DRAM-Based Hybrid Memory Systems

Zhangling Wu , Peiquan Jin , Chengcheng Yang , Lihua Yue
11th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2014, Ilan, Taiwan. pp.84-95, ⟨10.1007/978-3-662-44917-2_8⟩
Conference papers hal-01403068v1
Image document

UKCF: A New Graphics Driver Cross-Platform Translation Framework for Virtual Machines

Haitao Jiang , Yun Xu , Yin Liao , Guojie Jin , Guoliang Chen
9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.156-163, ⟨10.1007/978-3-642-35606-3_18⟩
Conference papers hal-01551325v1
Image document

An Efficient Method for Determining Full Point-to-Point Latency of Arbitrary Indirect HPC Networks

Chengchun Liu , Zhang Yang , Limin Xiao , Baicheng Yan , Zhihao Wang , et al.
15th IFIP International Conference on Network and Parallel Computing (NPC), Nov 2018, Muroran, Japan. pp.52-63, ⟨10.1007/978-3-030-05677-3_5⟩
Conference papers hal-02279556v1
Image document

DLIR: An Intermediate Representation for Deep Learning Processors

Huiying Lan , Zidong Du
15th IFIP International Conference on Network and Parallel Computing (NPC), Nov 2018, Muroran, Japan. pp.169-173, ⟨10.1007/978-3-030-05677-3_19⟩
Conference papers hal-02279553v1
Image document

Denial-of-Service Security Attack in the Continuous-Time World

Shuling Wang , Flemming Nielson , Hanne Riis Nielson
34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.149-165, ⟨10.1007/978-3-662-43613-4_10⟩
Conference papers hal-01398014v1
Image document

An Efficient Simulation Algorithm for Cache of Random Replacement Policy

Shuchang Zhou
IFIP International Conference on Network and Parallel Computing (NPC), Sep 2010, Zhengzhou, China. pp.144-154, ⟨10.1007/978-3-642-15672-4_13⟩
Conference papers hal-01054982v1
Image document

TerraCheck: Verification of Dedicated Cloud Storage

Zhan Wang , Kun Sun , Sushil Jajodia , Jiwu Jing
27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.113-127, ⟨10.1007/978-3-642-39256-6_8⟩
Conference papers hal-01490720v1
Image document

PROFILING AND TRACKING A CYBERLOCKER LINK SHARER IN A PUBLIC WEB FORUM

Xiao-Xi Fan , Kam-Pui Chow , Fei Xu
11th IFIP International Conference on Digital Forensics (DF), Jan 2015, Orlando, FL, United States. pp.97-113, ⟨10.1007/978-3-319-24123-4_6⟩
Conference papers hal-01449072v1
Image document

A Task-Based Model for the Lifespan of Peer-to-Peer Swarms

Yong Zhao , Zhibin Zhang , Ting He , Alex X. Liu , Li Guo , et al.
11th International Networking Conference (NETWORKING), May 2012, Prague, Czech Republic. pp.71-83, ⟨10.1007/978-3-642-30054-7_6⟩
Conference papers hal-01531955v1