Sciweavers

1711 search results - page 319 / 343
» Completing pseudojump operators
Sort
View
CONEXT
2008
ACM
13 years 9 months ago
A priority-layered approach to transport for high bandwidth-delay product networks
High-speed organizational networks running over leased fiber-optic lines or VPNs suffer from the well-known limitations of TCP over long-fat pipes. High-performance protocols like...
Vidhyashankar Venkataraman, Paul Francis, Murali S...
ATMOS
2007
13 years 9 months ago
Maintenance of Multi-level Overlay Graphs for Timetable Queries
In railways systems the timetable is typically represented as a weighted digraph on which itinerary queries are answered by shortest path algorithms, usually running Dijkstra’s a...
Francesco Bruera, Serafino Cicerone, Gianlorenzo D...
SNPD
2008
13 years 9 months ago
An Approach to Modeling Software Safety
: Software for safety-critical systems has to deal with the hazards identified by safety analysis in order to make the system safe, risk-free and fail-safe. Software safety is a co...
M. Ben Swarup, P. Seetha Ramaiah
LISA
2004
13 years 9 months ago
LifeBoat: An Autonomic Backup and Restore Solution
We present an innovative backup and restore solution, called LifeBoat, for Windows machines. Our solution provides for local and remote backups and ``bare metal'' restor...
Ted Bonkenburg, Dejan Diklic, Benjamin Reed, Mark ...
SOSP
1997
ACM
13 years 9 months ago
Towards Transparent and Efficient Software Distributed Shared Memory
Despite a large research effort, software distributed shared memory systems have not been widely used to run parallel applications across clusters of computers. The higher perform...
Daniel J. Scales, Kourosh Gharachorloo