Sciweavers

3141 search results - page 557 / 629
» Computing the performability of layered distributed systems ...
Sort
View
HPDC
2010
IEEE
13 years 10 months ago
Cluster-wide context switch of virtualized jobs
Clusters are mostly used through Resources Management Systems (RMS) with a static allocation of resources for a bounded amount of time. Those approaches are known to be insufficie...
Fabien Hermenier, Adrien Lebre, Jean-Marc Menaud
IWCMC
2006
ACM
14 years 3 months ago
Titan: a new paradigm in wireless internet access based on community collaboration
This paper introduces project TITAN, which investigates an alternative construct of residential broadband access. The aim of the project is to increase the utilisation of deployed...
Björn Landfeldt, Jahan Hassan, Albert Y. Zoma...
ICS
2004
Tsinghua U.
14 years 2 months ago
EXPERT: expedited simulation exploiting program behavior repetition
Studying program behavior is a central component in architectural designs. In this paper, we study and exploit one aspect of program behavior, the behavior repetition, to expedite...
Wei Liu, Michael C. Huang
MMM
2005
Springer
185views Multimedia» more  MMM 2005»
14 years 2 months ago
Database Support for Haptic Exploration in Very Large Virtual Environments
The efficient management of complex objects has become an enabling technology for modern multimedia information systems as well as for many novel database applications. Unfortunat...
Hans-Peter Kriegel, Peter Kunath, Martin Pfeifle, ...
IPPS
2007
IEEE
14 years 3 months ago
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols
Most of the current trust models in peer-to-peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer’s ide...
Li Lu, Jinsong Han, Lei Hu, Jinpeng Huai, Yunhao L...