Sciweavers

734 search results - page 138 / 147
» Multiprocess Time Queue
Sort
View
SPAA
2009
ACM
14 years 10 months ago
Scalable reader-writer locks
We present three new reader-writer lock algorithms that scale under high read-only contention. Many previous reader-writer locks suffer significant degradation when many readers a...
Yossi Lev, Victor Luchangco, Marek Olszewski
SPAA
2009
ACM
14 years 10 months ago
Beyond nested parallelism: tight bounds on work-stealing overheads for parallel futures
Work stealing is a popular method of scheduling fine-grained parallel tasks. The performance of work stealing has been extensively studied, both theoretically and empirically, but...
Daniel Spoonhower, Guy E. Blelloch, Phillip B. Gib...
STOC
2002
ACM
111views Algorithms» more  STOC 2002»
14 years 10 months ago
The price of anarchy is independent of the network topology
We study the degradation in network performance caused by the selfish behavior of noncooperative network users. We consider a model of selfish routing in which the latency experie...
Tim Roughgarden
SIGMOD
2005
ACM
138views Database» more  SIGMOD 2005»
14 years 10 months ago
QPipe: A Simultaneously Pipelined Relational Query Engine
Relational DBMS typically execute concurrent queries independently by invoking a set of operator instances for each query. To exploit common data retrievals and computation in con...
Stavros Harizopoulos, Vladislav Shkapenyuk, Anasta...
HICSS
2010
IEEE
161views Biometrics» more  HICSS 2010»
14 years 4 months ago
Managing Information Intensive Service Facilities: Executive Contracts, Market Information, and Capacity Planning
in Progress – Extended Abstract Word count: 3124 Effectively managing IT service centers such as call centers, computerized diagnostic imaging facilities, data centers, e-commerc...
Yabing Jiang, Abraham Seidmann