Sciweavers

219 search results - page 37 / 44
» Checkpoints of GUI-based Applications
Sort
View
JPDC
2007
112views more  JPDC 2007»
13 years 9 months ago
CHEMAS: Identify suspect nodes in selective forwarding attacks
Selective forwarding attacks may corrupt some mission-critical applications such as military surveillance and forest fire monitoring in wireless sensor networks. In such attacks,...
Bin Xiao, Bo Yu, Chuanshan Gao
CCGRID
2007
IEEE
14 years 4 months ago
Reparallelization and Migration of OpenMP Programs
Typical computational grid users target only a single cluster and have to estimate the runtime of their jobs. Job schedulers prefer short-running jobs to maintain a high system ut...
Michael Klemm, Matthias Bezold, Stefan Gabriel, Ro...
ISSRE
2002
IEEE
14 years 2 months ago
The Impact of Recovery Mechanisms on the Likelihood of Saving Corrupted State
Recovery systems must save state before a failure occurs to enable the system to recover from the failure. However, recovery will fail if the recovery system saves any state corru...
Subhachandra Chandra, Peter M. Chen
GRID
2008
Springer
13 years 11 months ago
Scheduling on the Grid via multi-state resource availability prediction
To make the most effective application placement decisions on volatile large-scale heterogeneous Grids, schedulers must consider factors such as resource speed, load, and reliabil...
Brent Rood, Michael J. Lewis
OSDI
2002
ACM
14 years 10 months ago
The Design and Implementation of Zap: A System for Migrating Computing Environments
We have created Zap, a novel system for transparent migration of legacy and networked applications. Zap provides a thin virtualization layer on top of the operating system that in...
Steven Osman, Dinesh Subhraveti, Gong Su, Jason Ni...