Sciweavers

1522 search results - page 243 / 305
» Design and Implementation of a Policy-based Resource Managem...
Sort
View
WWW
2003
ACM
16 years 5 months ago
SHOCK: communicating with computational messages and automatic private profiles
A computationally enhanced message contains some embedded programmatic components that are interpreted and executed automatically upon receipt. Unlike ordinary text email or insta...
Rajan M. Lukose, Eytan Adar, Joshua R. Tyler, Caes...
MOBISYS
2009
ACM
16 years 5 months ago
Fidelity-aware replication for mobile devices
Mobile devices often store data in reduced resolutions or custom formats in order to accommodate resource constraints and tailormade software. The Polyjuz framework enables sharin...
Kaushik Veeraraghavan, Venugopalan Ramasubramanian...
INFOCOM
2009
IEEE
15 years 11 months ago
P2P Second Life: Experimental Validation Using Kad
: Applications such as Second Life require massive deployment of servers worldwide to support a large number of users. We investigate experimentally how Peer-to-Peer (P2P) communic...
Matteo Varvello, C. Diout, Ernst W. Biersack
NGC
1998
Springer
171views Communications» more  NGC 1998»
15 years 4 months ago
Programming Languages for Distributed Applications
Much progress has been made in distributed computing in the areas of distribution structure, open computing, fault tolerance, and security. Yet, writing distributed applications r...
Seif Haridi, Peter Van Roy, Per Brand, Christian S...
PIMRC
2010
IEEE
15 years 2 months ago
Low-complexity admission control for distributed power-controlled networks with stochastic channels
This study addresses the general problem of efficient resource management in wireless networks with arbitrary timevarying topologies. Communication channels are assumed to generall...
Stepán Kucera, Bing Zhang