167 resultados para GPU computing


Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper looks at intervention programmes to improve the representation of female students in computing education and the computer industry, A multiple case study methodology was used to look at major intervention programmes conducted in Australia. One aspect of the research focused on the programme champions; those women from the computing industry, those working within government organisations and those in academia who instigated the programmes. The success of these intervention programmes appears to have been highly dependent upon not only the design of the programme but on the involvement of these strong individuals who were passionate and worked tirelessly to ensure the programme's success. This paper provides an opportunity for the voices of these women to be heard. It describes the champions' own initial involvement with computing which frequently motivated and inspired them to conduct such programmes. The research found that when these types of intervention programmes were conducted by academic staff the work was undervalued compared to when the activities were conducted by staff in industry or in government. The academic environment was often not supportive of academics who conducted intervention programmes for female students.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The vision of volunteer computing is to provide large scale computational infrastructure by using dynamic collections of donated desktop computers. There have been many works that highlighted the significant benefits of volunteer computing but little on the security and privacy threats associated with its exploitation. However, volunteer computing is vulnerable to a variety of attacks and presents numerous significant security threats to the stakeholders. This paper presents security and privacy threat taxonomy along with the security features developed to cope with such threats.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The overall performance of a distributed system often depends on the effectiveness of its interconnection network. Thus, the study of the communication networks for distributed systems is very important, which is the focus of this paper. In particular, we address the problem of interconnection networks performance modeling for heterogeneous meta-computing systems. We consider the meta-computing system as a typical multi-cluster system. Since the heterogeneity is becoming common in such systems, we take into account network as well as cluster size heterogeneity to propose the model. To this end, we present an analytical network model and validate the model through comprehensive simulation. The results of the simulation demonstrated that the proposed model exhibits a good degree of accuracy for various system organizations and under different working conditions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Grid users and their jobs need credentials to access grid resources and services. It is important to minimize the exposure of credentials to adversaries. A practical solution is needed that works with existing software and is easy to deploy, administer, and maintain. Thus, credential management services are the wave of the future for virtual organizations such as Grid computing. This paper describes architecture of a scalable, secure and reliable on-line credential management service called SafeBox for InterGrid computing platform. SafeBox provides InterGrid users with secure mechanism for storing one or multiple credentials and access them based on need at anytime from anywhere.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This special issue is in response to the increasing convergence between grids and pervasive computing, while different approaches exist, challenges and opportunities are numerous in this context (Parashar and Pierson, to appear). The research papers selected for this special issue represent recent progresses in the field, including works on mobile ad-hoc grids, service and data discovery, context-aware application building and context accuracy, and communication. All of these papers not only provide novel ideas and state-of-the-art techniques in the field, but also stimulate future research in the Pervasive Grid environment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Many intervention programmes to encourage greater female participation in computer education and careers have been conducted in the last twenty years. These intervention programmes take considerable time, effort and money to design and implement. If success were to be measured by an increase in the percentage of female students undertaking computing courses then these programmes would have to be considered a failure. This paper describes a research project which examined fourteen intervention programmes in detail. From the perspective of the programme champions each of the intervention programmes was considered successful, even when this success was restricted to specific areas or limited to small groups of individuals. Formal evaluation appeared to have been an afterthought rather than a priority of many of the programme champions. Some programmes appeared to be less effective due to the lack of targeted and clear goals or predetermined evaluation criteria. It is recommended that during the initial planning phase for intervention programmes a clear objective is to consider what a successful programme would look like and what the evaluation criteria would be. Further work is needed to understand how intervention programmes can be better designed and evaluated so that their impact and success can be expanded.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Participation in post-compulsory computing education has declined over recent years, both in the senior years of secondary school and at university. This trend has been observed in most developed countries, despite reported and projected skills shortages in Information Technology (IT) industries. Within the computing education enrollment mix, girls and women continue to be under-represented and recent years have seen female participation fall even more rapidly than that of males. This article reports on findings of an Australian study which explored secondary school students’ beliefs about and attitudes towards computing education and careers in IT. Factors that might discourage girls in particular from pursuing post-compulsory computing education and careers are discussed, along with broader implications for school education in an era when information and communication technologies are an integral part of our daily lives. Findings include the persistence among both boys and girls of inaccurate and outdated views of the field of IT and low expectations of both school IT curricula and pedagogy in terms of their relevance and interest for students. Many of the issues identified as discouraging students in general from pursuing computing education appear to have a greater discouraging effect on girls, and this is compounded by stereotypical views of the field as male-dominated and unwelcoming to women and girls.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study presents a theoretical basis for and outlines the method of finding the Lie point symmetries of systems of partial differential equations. It seeks to determine which of five computer algebra packages is best at finding these symmetries. The chosen packages are LIEPDE and DIMSYM for REDUCE, LIE and BIGLIE for MUMATH, DESOLV for MAPLE, and MATHLIE for MATHEMATICA. This work concludes that while all of the computer packages are useful, DESOLV appears to be the most successful system at determining the complete set of Lie symmetries. Also, the study describes REDUCEVAR, a new package for MAPLE, that reduces the number of independent variables in systems of partial differential equations, using particular Lie point symmetries. It outlines the results of some testing carried out on this package. It concludes that REDUCEVAR is a very useful tool in performing the reduction of independent variables according to Lie's theory and is highly accurate in identifying cases where the symmetries are not suitable for finding S/G equations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Fifty years ago there were no stored-program electronic computers in the world. Even thirty years ago a computer was something that few organisations could afford, and few people could use. Suddenly, in the 1960s and 70s, everything changed and computers began to become accessible. Today* the need for education in Business Computing is generally acknowledged, with each of Victoria's seven universities offering courses of this type. What happened to promote the extremely rapid adoption of such courses is the subject of this thesis. I will argue that although Computer Science began in Australia's universities of the 1950s, courses in Business Computing commenced in the 1960s due to the requirement of the Commonwealth Government for computing professionals to fulfil its growing administrative needs. The Commonwealth developed Programmer-in-Training courses were later devolved to the new Colleges of Advanced Education. The movement of several key figures from the Commonwealth Public Service to take up positions in Victorian CAEs was significant, and the courses they subsequently developed became the model for many future courses in Business Computing. The reluctance of the universities to become involved in what they saw as little more than vocational training, opened the way for the CAEs to develop this curriculum area.