Sciweavers

175 search results - page 11 / 35
» Password policy simulation and analysis
Sort
View
CLUSTER
2004
IEEE
14 years 23 days ago
An evaluation of the close-to-files processor and data co-allocation policy in multiclusters
In multicluster systems, and more generally, in grids, jobs may require co-allocation, i.e., the simultaneous allocation of resources such as processors and input files in multipl...
Hashim H. Mohamed, Dick H. J. Epema
IEEEHPCS
2010
13 years 7 months ago
No more crash or crunch: Sustainable credit dynamics in a P2P community
Abstract—Many peer-to-peer file sharing communities implement credit policies to incentivise users to contribute upload resources. Such policies implicitly assume a user model -...
Rameez Rahman, David Hales, Tamas Vinko, Johan A. ...
DGO
2008
131views Education» more  DGO 2008»
13 years 10 months ago
A domain-specific language for urban simulation variables
UrbanSim is a modeling system for simulating the development of urban regions over periods of 20-30 years. Its purpose is to help evaluate alternative proposed policies and transp...
Alan Borning, Hana Sevcikova, Paul Waddell
WSC
2008
13 years 11 months ago
Iterative use of simulation and scheduling methodologies to improve productivity
Experienced and wise industrial engineering educators and practitioners have long understood that industrial engineering is a coherent discipline encompassing techniques that work...
Karthik Krishna Vasudevan, Ravindra Lote, Edward J...
IPPS
1997
IEEE
14 years 1 months ago
An Accurate Model for the Performance Analysis of Deterministic Wormhole Routing
We present a new analytical approach for the performance evaluation of asynchronous wormhole routing in k-ary n-cubes. Through the analysis of network flows, our methodology furni...
Bruno Ciciani, Claudio Paolucci, Michele Colajanni