Sciweavers

1877 search results - page 305 / 376
» Network Locality at the Scale of Processes
Sort
View
156
Voted
AAIM
2007
Springer
126views Algorithms» more  AAIM 2007»
15 years 9 months ago
Mixed Criteria Packet Scheduling
Packet scheduling in networks with quality of service constraints has been extensively studied as a single criterion scheduling problem. The assumption underlying single criterion ...
Chad R. Meiners, Eric Torng
SPAA
2009
ACM
15 years 10 months ago
Distributed algorithms for QoS load balancing
We consider a dynamic load balancing scenario in which users allocate resources in a non-cooperative and selfish fashion. The perceived performance of a resource for a user decre...
Heiner Ackermann, Simon Fischer, Martin Hoefer, Ma...
148
Voted
ISCA
1994
IEEE
129views Hardware» more  ISCA 1994»
15 years 7 months ago
Software Versus Hardware Shared-Memory Implementation: A Case Study
We comparethe performance of software-supported shared memory on a general-purpose network to hardware-supported shared memory on a dedicated interconnect. Up to eight processors,...
Alan L. Cox, Sandhya Dwarkadas, Peter J. Keleher, ...
INFOCOM
2012
IEEE
13 years 6 months ago
A comparative study of architectural impact on BGP next-hop diversity
—Large ISPs have been growing rapidly in both the size and global connectivity. To scale with the sheer number of routers, many providers have replaced the flat full-mesh iBGP c...
Jong Han Park, Pei-chun Cheng, Shane Amante, Doria...
143
Voted
ICETE
2004
204views Business» more  ICETE 2004»
15 years 5 months ago
A Real-Time Intrusion Prevention System for Commercial Enterprise Databases
: - Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural ba...
Ulf T. Mattsson