Sciweavers

886 search results - page 138 / 178
» Generalized Bezout Identity
Sort
View
SIGMETRICS
2005
ACM
150views Hardware» more  SIGMETRICS 2005»
14 years 2 months ago
An analytical model for multi-tier internet services and its applications
- Since many Web applications employ a multi-tier architecture, in this paper, we focus on the problem of analytically modeling the behavior of such applications. We present a mode...
Bhuvan Urgaonkar, Giovanni Pacifici, Prashant J. S...
EUROPAR
2005
Springer
14 years 2 months ago
Hierarchical Scheduling for Moldable Tasks
The model of moldable task (MT) was introduced some years ago and has been proved to be an efficient way for implementing parallel applications. It considers a target application ...
Pierre-François Dutot
WAOA
2005
Springer
104views Algorithms» more  WAOA 2005»
14 years 2 months ago
The Online Target Date Assignment Problem
Abstract. Many online problems encountered in real-life involve a twostage decision process: upon arrival of a new request, an irrevocable firststage decision (the assignment of a...
Stefan Heinz, Sven Oliver Krumke, Nicole Megow, J&...
ICCHP
2004
Springer
14 years 2 months ago
Minus-Two: Multimedia, Sound Spatialization and 3D Representation for Cognitively Impaired Children
: Multimedia and Hypermedia technologies can be successfully used in education and rehabilitation for cognitively disabled persons. In particular, storytelling has always proved su...
Thimoty Barbieri, Antonio Bianchi, Licia Sbattella
SACMAT
2003
ACM
14 years 2 months ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf