Sciweavers

6894 search results - page 1296 / 1379
» On network interference management
Sort
View
HPDC
2008
IEEE
15 years 11 months ago
Combining batch execution and leasing using virtual machines
As cluster computers are used for a wider range of applications, we encounter the need to deliver resources at particular times, to meet particular deadlines, and/or at the same t...
Borja Sotomayor, Kate Keahey, Ian T. Foster
130
Voted
HPDC
2007
IEEE
15 years 11 months ago
Towards adaptive, scalable, and reliable resource provisioning for wsrf-compliant applications
Although WSRF (Web Services Resource Framework) and Java-based hosting environment have been successful in dealing with the heterogeneity of resources and the diversity of applica...
Eun-Kyu Byun, Jae-Wan Jang, Jin-Soo Kim
160
Voted
IEEESCC
2007
IEEE
15 years 11 months ago
Web Services Security and Privacy
eb services are becoming widely deployed to implement the automation of business processes such as supply chain management, inventory tracking, and healthcare management, just to ...
Patrick C. K. Hung, Casey K. Fung
SASO
2007
IEEE
15 years 11 months ago
e-SAFE: An Extensible, Secure and Fault Tolerant Storage System
With the rapidly falling price of hardware, and increasingly available bandwidth, the storage technology is seeing a paradigm shift from centralized and managed mode to distribute...
Sandip Agarwala, Arnab Paul, Umakishore Ramachandr...
ADBIS
2007
Springer
124views Database» more  ADBIS 2007»
15 years 10 months ago
Fast and Efficient Log File Compression
Contemporary information systems are replete with log files, created in multiple places (e.g., network servers, database management systems, user monitoring applications, system se...
Przemyslaw Skibinski, Jakub Swacha
« Prev « First page 1296 / 1379 Last » Next »