Sciweavers

130 search results - page 23 / 26
» An effective pointer replication algorithm in P2P networks
Sort
View
135
Voted
ICPP
2002
IEEE
15 years 7 months ago
Optimal Video Replication and Placement on a Cluster of Video-on-Demand Servers
A cost-effective approach to building up scalable Videoon-Demand (VoD) servers is to couple a number of VoD servers together in a cluster. In this article, we study a crucial vide...
Xiaobo Zhou, Cheng-Zhong Xu
122
Voted
PLDI
2006
ACM
15 years 8 months ago
DieHard: probabilistic memory safety for unsafe languages
Applications written in unsafe languages like C and C++ are vulnerable to memory errors such as buffer overflows, dangling pointers, and reads of uninitialized data. Such errors ...
Emery D. Berger, Benjamin G. Zorn
MOBISYS
2010
ACM
15 years 4 months ago
Docx2Go: collaborative editing of fidelity reduced documents on mobile devices
Docx2Go is a new framework to support editing of shared documents on mobile devices. Three high-level requirements influenced its design -- namely, the need to adapt content, espe...
Krishna P. N. Puttaswamy, Catherine C. Marshall, V...
SIGOPSE
1990
ACM
15 years 6 months ago
A replicated Unix file system
u s e s t h e p r i m a r y c o p y r e p l i c a t i o nAbstract technique [1, 26, 27]. In this method, client calls are directed to a single primary server, which communicatesThi...
Barbara Liskov, Robert Gruber, Paul Johnson, Liuba...
JCP
2008
99views more  JCP 2008»
15 years 2 months ago
Scheduling Algorithm with Potential Behaviors
Abstract--Scheduling algorithm for batch-mode dataintensive jobs is a key issue in data-intensive Grid applications. It focuses on how to minimize the overhead of transferring the ...
Jianhua Jiang, Huifang Ji, Gaochao Xu, Xiaohui Wei