Sciweavers

651 search results - page 118 / 131
» A Service Scheduler in a Trustworthy System
Sort
View
RTSS
1999
IEEE
13 years 11 months ago
On the Use of Formal Techniques for Analyzing Dependable Real-Time Protocols
The e ective design of composite dependable and real-time protocols entails demonstrating their proof of correctness and, in practice, the e cient delivery of services. We focus o...
Purnendu Sinha, Neeraj Suri
CIC
2003
150views Communications» more  CIC 2003»
13 years 8 months ago
Performance Modeling of a Cluster of Workstations
Using off-the-shelf commodity workstations to build a cluster for parallel computing has become a common practice. In studying or designing a cluster of workstations one should ha...
Ahmed M. Mohamed, Lester Lipsky, Reda A. Ammar
ASPLOS
2004
ACM
14 years 25 days ago
An ultra low-power processor for sensor networks
We present a novel processor architecture designed specifically for use in low-power wireless sensor-network nodes. Our sensor network asynchronous processor (SNAP/LE) is based on...
Virantha N. Ekanayake, Clinton Kelly IV, Rajit Man...
HICSS
2003
IEEE
132views Biometrics» more  HICSS 2003»
14 years 21 days ago
Markets for Reliability and Financial Options in Electricity: Theory to Support the Practice
The underlying structure of why and how consumers value reliability of electric service is explored, together with the technological options and cost characteristics for the provi...
Timothy Mount, William Schulze, Richard E. Schuler
ANSS
2008
IEEE
14 years 1 months ago
Simulation of Buffer Management Policies in Networks for Grids
Grid technologies are emerging as the next generation of distributed computing, allowing the aggregation of resources that are geographically distributed across different location...
Agustín C. Caminero, Anthony Sulistio, Blan...