Learn More
This paper demonstrates the effectiveness of the two-phase method of scheduling, in which task clustering is performed prior to the actual scheduling process. Task clustering determines the optimal or near-optimal number of processors on which to schedule the task graph. In other words, there is never a need to use more processors (even though they are(More)
In this paper, we present an efficient algorithm, called CASS-II, for task clustering without task duplication. Unlike the DSC algorithm, which is empirically the best known algorithm to date in terms of both speed and solution quality, CASS-II uses only limited ``global'' information and does not recompute the critical path in each refinement step.(More)
Authentication is the process of verifying a user's credentials when they are requesting services from any secure system. The most commonly form of authentication is the single-factor authentication, which only requires one factor for the user to log into the system. In this case, the username and password together act as a single-factor. A more secure(More)
The thesis of this research is that the task of exposing the parallelism in a given application should be left to the algorithm designer, who has intimate knowledge of the application characteristics. On the other hand, the task of limiting the parallelism in a chosen parallel algorithm is best handled by the compiler or operating system for the target MPP(More)
During the last decade, software engineering researchers have tried to identify the success and obstacle factors to the software development. Conclusions from many of the researches related to the issue show that software process is one of the most important subjects contributing into the success or failure to the software development. Among the Capability(More)
Online service is an important driving force behind many of today's Web 2.0 applications. For security and privacy concerns, authentication is required for all of services that involve online transactions. Authentication is the process of verifying a user's identity when the user is requesting services from any secure Information System (IS). By far, the(More)