Sciweavers

964 search results - page 9 / 193
» On Securely Scheduling a Meeting
Sort
View
RTAS
2006
IEEE
14 years 3 months ago
On Non-Utilization Bounds for Arbitrary Fixed Priority Policies
Prior research on schedulability bounds focused primarily on bounding utilization as a means to meet deadline constraints. Non-trivial bounds were found for a handful of schedulin...
Xue Liu, Tarek F. Abdelzaher
COR
2006
81views more  COR 2006»
13 years 9 months ago
Assignment of swimmers to dual meet events
Every fall, thousands of high school swimming coaches across the country begin the arduous process of preparing their athletes for competition. With a grueling practice schedule a...
Maciek Nowak, Marina A. Epelman, Stephen M. Polloc...
SOSP
2007
ACM
14 years 6 months ago
Tolerating byzantine faults in transaction processing systems using commit barrier scheduling
This paper describes the design, implementation, and evaluation of a replication scheme to handle Byzantine faults in transaction processing database systems. The scheme compares ...
Ben Vandiver, Hari Balakrishnan, Barbara Liskov, S...
SP
2002
IEEE
124views Security Privacy» more  SP 2002»
13 years 9 months ago
Applying scheduling and tuning to on-line parallel tomography
Shava Smallen, Henri Casanova, Francine Berman