Sciweavers

1636 search results - page 205 / 328
» Managing Distributed Applications Using Gush
Sort
View
103
Voted
CLUSTER
2002
IEEE
15 years 7 months ago
Shell over a Cluster (SHOC): Towards Achieving Single System Image via the Shell
With dramatic improvements in cost-performance, the use of clusters of personal computers is fast becoming widespread. For ease of use and management, a Single System Image (SSI) ...
C. M. Tan, C. P. Tan, Weng-Fai Wong
EUROSYS
2008
ACM
15 years 11 months ago
BorderPatrol: isolating events for black-box tracing
Causal request traces are valuable to developers of large concurrent and distributed applications, yet difficult to obtain. Traces show how a request is processed, and can be anal...
Eric Koskinen, John Jannotti
148
Voted
JCIT
2008
245views more  JCIT 2008»
15 years 2 months ago
Quality of Service (QoS) of Voice over MAC Protocol 802.11 using NS-2
Transmitting voice through IP data network can provide significant cost savings. However if not managed properly, voice quality can degrade due to data network congestion. Voice o...
Dileep Kumar, Saleem Ahmed, Yeonseung Ryu
138
Voted
IPPS
2007
IEEE
15 years 9 months ago
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols
Most of the current trust models in peer-to-peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer’s ide...
Li Lu, Jinsong Han, Lei Hu, Jinpeng Huai, Yunhao L...
124
Voted
ESCIENCE
2007
IEEE
15 years 9 months ago
Decentralised Resource Discovery Service for Large Scale Federated Grids
Efficient Resource discovery mechanism is one of the fundamental requirement for Grid computing systems, as it aids in resource management and scheduling of applications. Resourc...
Rajiv Ranjan, Lipo Chan, Aaron Harwood, Shanika Ka...