Sciweavers

233 search results - page 8 / 47
» Evaluation of fault-tolerant policies using simulation
Sort
View
WETICE
2006
IEEE
14 years 1 months ago
A Hybrid P2P Protocol for Real-Time Collaboration
Peer-to-Peer architecture is currently an attractive solution for facilitating the use of collaboration software without any server. Multicasting is usually proposed for group com...
Dewan Tanvir Ahmed, Shervin Shirmohammadi
CN
2002
116views more  CN 2002»
13 years 7 months ago
ProWGen: a synthetic workload generation tool for simulation evaluation of web proxy caches
This paper describes the design and use of a synthetic Web proxy workload generator called ProWGen to investigate the sensitivity of Web proxy cache replacement policies to five se...
Mudashiru Busari, Carey L. Williamson
WSC
1997
13 years 9 months ago
Evaluation of a (R, s, Q, c) Multi-Item Inventory Replenishment Policy Through Simulation
In this paper, the case of a cardboard box marketing firm is studied and a (R,s,Q,c) inventory replenishment policy is proposed and evaluated by means of discrete event simulation...
Carlos B. Ramirez Cerda, Armando J. Espinosa de lo...
ISCA
1999
IEEE
187views Hardware» more  ISCA 1999»
14 years 10 hour ago
Area Efficient Architectures for Information Integrity in Cache Memories
Information integrity in cache memories is a fundamental requirement for dependable computing. Conventional architectures for enhancing cache reliability using check codes make it...
Seongwoo Kim, Arun K. Somani
MASCOTS
2004
13 years 9 months ago
Simulation Evaluation of Hybrid SRPT Scheduling Policies
This paper uses trace-driven simulations to evaluate two novel Web server scheduling policies called KSRPT and T-SRPT. K-SRPT is a multi-threaded version of SRPT (Shortest Remaini...
Mingwei Gong, Carey L. Williamson