Sciweavers

2107 search results - page 335 / 422
» Computing Small Search Numbers in Linear Time
Sort
View
DSOM
2003
Springer
14 years 2 months ago
Automating Enterprise Application Placement in Resource Utilities
Abstract. Enterprise applications implement business resource management systems, customer relationship management systems, and general systems for commerce. These applications rel...
Jerry Rolia, Artur Andrzejak, Martin F. Arlitt
ICS
2003
Tsinghua U.
14 years 2 months ago
Performance characteristics of openMP constructs, and application benchmarks on a large symmetric multiprocessor
With the increasing popularity of small to large-scale symmetric multiprocessor (SMP) systems, there has been a dire need to have sophisticated, and flexible development and runt...
Nathan R. Fredrickson, Ahmad Afsahi, Ying Qian
NDSS
2002
IEEE
14 years 1 months ago
An Analysis of the Degradation of Anonymous Protocols
There have been a number of protocols proposed for anonymous network communication. In this paper we investigate attacks by corrupt group members that degrade the anonymity of eac...
Matthew Wright, Micah Adler, Brian Neil Levine, Cl...
PKC
1999
Springer
91views Cryptology» more  PKC 1999»
14 years 1 months ago
A Secure Pay-per View Scheme for Web-Based Video Service
With the development of high speed computer networks, video service on the Web has huge market potential in that the video service can be provided to subscribers with greater time ...
Jianying Zhou, Kwok-Yan Lam
FOCS
1993
IEEE
14 years 1 months ago
Simulated Annealing for Graph Bisection
We resolve in the a rmative a question of Boppana and Bui: whether simulated annealing can, with high probability and in polynomial time, nd the optimal bisection of a random grap...
Mark Jerrum, Gregory B. Sorkin