Sciweavers

4118 search results - page 748 / 824
» Mechanisms for usage control
Sort
View
195
Voted
VEE
2012
ACM
218views Virtualization» more  VEE 2012»
13 years 11 months ago
Enhancing TCP throughput of highly available virtual machines via speculative communication
Checkpoint-recovery based virtual machine (VM) replication is an attractive technique for accommodating VM installations with high-availability. It provides seamless failover for ...
Balazs Gerofi, Yutaka Ishikawa
141
Voted
CHI
2009
ACM
16 years 4 months ago
The mousegrip
Computer games, often played with others, are a compelling pastime for many. However, they have been criticized for their mouse and keyboard or gamepad interactions, as they suppo...
Florian Mueller, Martin R. Gibbs, Frank Vetere
173
Voted
HPCA
2008
IEEE
16 years 4 months ago
System level analysis of fast, per-core DVFS using on-chip switching regulators
Portable, embedded systems place ever-increasing demands on high-performance, low-power microprocessor design. Dynamic voltage and frequency scaling (DVFS) is a well-known techniq...
Wonyoung Kim, Meeta Sharma Gupta, Gu-Yeon Wei, Dav...
126
Voted
STOC
2007
ACM
101views Algorithms» more  STOC 2007»
16 years 4 months ago
The price of privacy and the limits of LP decoding
This work is at the intersection of two lines of research. One line, initiated by Dinur and Nissim, investigates the price, in accuracy, of protecting privacy in a statistical dat...
Cynthia Dwork, Frank McSherry, Kunal Talwar
132
Voted
OSDI
2002
ACM
16 years 4 months ago
Resource Overbooking and Application Profiling in Shared Hosting Platforms
In this paper, we present techniques for provisioning CPU and network resources in shared hosting platforms running potentially antagonistic third-party applications. The primary ...
Bhuvan Urgaonkar, Prashant J. Shenoy, Timothy Rosc...