Sciweavers

1929 search results - page 258 / 386
» Load Balancing with Memory
Sort
View
CP
2009
Springer
14 years 11 months ago
Confidence-Based Work Stealing in Parallel Constraint Programming
The most popular architecture for parallel search is work stealing: threads that have run out of work (nodes to be searched) steal from threads that still have work. Work stealing ...
Geoffrey Chu, Christian Schulte, Peter J. Stuckey
PODC
2009
ACM
14 years 11 months ago
Correctness of gossip-based membership under message loss
Due to their simplicity and effectiveness, gossip-based membership protocols have become the method of choice for maintaining partial membership in large P2P systems. A variety of...
Maxim Gurevich, Idit Keidar
HPCA
2009
IEEE
14 years 11 months ago
Elastic-buffer flow control for on-chip networks
This paper presents elastic buffers (EBs), an efficient flow-control scheme that uses the storage already present in pipelined channels in place of explicit input virtualchannel b...
George Michelogiannakis, James D. Balfour, William...
MOBISYS
2009
ACM
14 years 11 months ago
mFerio: the design and evaluation of a peer-to-peer mobile payment system
In this paper, we present the design and evaluation of a nearfield communication-based mobile p2p payment application called mFerio which is designed to replace cash-based transac...
Rajesh Krishna Balan, Narayan Ramasubbu, Komsit Pr...
VLDB
2007
ACM
101views Database» more  VLDB 2007»
14 years 10 months ago
SQLB: A Query Allocation Framework for Autonomous Consumers and Providers
In large-scale distributed information systems, where participants are autonomous and have special interests for some queries, query allocation is a challenge. Much work in this c...
Jorge-Arnulfo Quiané-Ruiz, Patrick Valdurie...