Sciweavers

80 search results - page 12 / 16
» Control Schemes in a Generalized Utility for Parallel Branch...
Sort
View
ICS
2009
Tsinghua U.
13 years 5 months ago
R-ADMAD: high reliability provision for large-scale de-duplication archival storage systems
Data de-duplication has become a commodity component in dataintensive systems and it is required that these systems provide high reliability comparable to others. Unfortunately, b...
Chuanyi Liu, Yu Gu, Linchun Sun, Bin Yan, Dongshen...
PDP
2010
IEEE
13 years 6 months ago
FTDS: Adjusting Virtual Computing Resources in Threshing Cases
—In the virtual execution environment, dynamic computing resource adjustment technique, configuring the computing resource of virtual machines automatically according to the actu...
Jian Huang, Hai Jin, Kan Hu, Zhiyuan Shao
HPDC
2008
IEEE
14 years 2 months ago
Managing SLAs of heterogeneous workloads using dynamic application placement
In this paper we address the problem of managing heterogeneous workloads in a virtualized data center. We consider two different workloads: transactional applications and long-ru...
David Carrera, Malgorzata Steinder, Ian Whalley, J...
PEWASUN
2004
ACM
14 years 1 months ago
A modified IEEE 802.11 MAC protocol for MC-CDMA
In this paper, we introduce a modified version of the IEEE 802.11a protocol and evaluate its performance. The new protocol is a combination of the standard Medium Access Control (...
Georgios Orfanos, Jörg Habetha, Ling Liu
CIKM
2009
Springer
14 years 2 months ago
POkA: identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice
Data generalization is widely used to protect identities and prevent inference of sensitive information during the public release of microdata. The k-anonymity model has been exte...
Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell ...