Sciweavers

7587 search results - page 1368 / 1518
» Network Analysis and Visualisation
Sort
View
HPDC
1999
IEEE
14 years 10 days ago
Overview of a Performance Evaluation System for Global Computing Scheduling Algorithms
While there have been several proposals of high performance global computing systems, scheduling schemes for the systems have not been well investigated. The reason is difficultie...
Atsuko Takefusa, Satoshi Matsuoka, Hidemoto Nakada...
COMPULOG
1999
Springer
14 years 9 days ago
Decomposable Constraints
Many constraint satisfaction problems can be naturally and efficiently modelled using non-binary constraints like the “all-different” and “global cardinality” constraints...
Ian P. Gent, Kostas Stergiou, Toby Walsh
LICS
1999
IEEE
14 years 9 days ago
Proving Security Protocols Correct
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...
Lawrence C. Paulson
INFOCOM
1998
IEEE
14 years 8 days ago
Performance Bounds for Dynamic Channel Assignment Schemes Operating under Varying Re-Use Constraints
-We derive bounds for the performance of dynamic channel assignment (DCA) schemeswhich strengthenthe existing Erlang bound. The construction of the bounds is based on a reward para...
Philip A. Whiting, Sem C. Borst
RTSS
1998
IEEE
14 years 8 days ago
Real-Time Scheduling in a Generic Fault-Tolerant Architecture
Previous ultra-dependable real-time computing architectures have been specialised to meet the requirements of a particular application domain. Over the last two years, a consortiu...
Andy J. Wellings, Ljerka Beus-Dukic, David Powell
« Prev « First page 1368 / 1518 Last » Next »