Sciweavers

1522 search results - page 227 / 305
» Design and Implementation of a Policy-based Resource Managem...
Sort
View
MOBIDE
2005
ACM
15 years 10 months ago
A general methodology for context-aware data access
In this paper, we present an extensible approach to the adaptation of Web information delivery according to different and possibly heterogeneous contexts. The approach is based o...
Roberto De Virgilio, Riccardo Torlone
132
Voted
SIGCOMM
2009
ACM
15 years 11 months ago
PortLand: a scalable fault-tolerant layer 2 data center network fabric
This paper considers the requirements for a scalable, easily manageable, fault-tolerant, and efficient data center network fabric. Trends in multi-core processors, end-host virtua...
Radhika Niranjan Mysore, Andreas Pamboris, Nathan ...
HPCA
2006
IEEE
16 years 5 months ago
The common case transactional behavior of multithreaded programs
Transactional memory (TM) provides an easy-to-use and high-performance parallel programming model for the upcoming chip-multiprocessor systems. Several researchers have proposed a...
JaeWoong Chung, Hassan Chafi, Chi Cao Minh, Austen...
147
Voted
ACSAC
2005
IEEE
15 years 10 months ago
Paranoid: A Global Secure File Access Control System
The Paranoid file system is an encrypted, secure, global file system with user managed access control. The system provides efficient peer-to-peer application transparent file ...
Fareed Zaffar, Gershon Kedem, Ashish Gehani
122
Voted
GECCO
2006
Springer
206views Optimization» more  GECCO 2006»
15 years 8 months ago
A dynamically constrained genetic algorithm for hardware-software partitioning
In this article, we describe the application of an enhanced genetic algorithm to the problem of hardware-software codesign. Starting from a source code written in a high-level lan...
Pierre-André Mudry, Guillaume Zufferey, Gia...