Sciweavers

175 search results - page 11 / 35
» Password policy simulation and analysis
Sort
View
CLUSTER
2004
IEEE
15 years 7 months ago
An evaluation of the close-to-files processor and data co-allocation policy in multiclusters
In multicluster systems, and more generally, in grids, jobs may require co-allocation, i.e., the simultaneous allocation of resources such as processors and input files in multipl...
Hashim H. Mohamed, Dick H. J. Epema
IEEEHPCS
2010
15 years 1 months ago
No more crash or crunch: Sustainable credit dynamics in a P2P community
Abstract—Many peer-to-peer file sharing communities implement credit policies to incentivise users to contribute upload resources. Such policies implicitly assume a user model -...
Rameez Rahman, David Hales, Tamas Vinko, Johan A. ...
DGO
2008
131views Education» more  DGO 2008»
15 years 4 months ago
A domain-specific language for urban simulation variables
UrbanSim is a modeling system for simulating the development of urban regions over periods of 20-30 years. Its purpose is to help evaluate alternative proposed policies and transp...
Alan Borning, Hana Sevcikova, Paul Waddell
140
Voted
WSC
2008
15 years 5 months ago
Iterative use of simulation and scheduling methodologies to improve productivity
Experienced and wise industrial engineering educators and practitioners have long understood that industrial engineering is a coherent discipline encompassing techniques that work...
Karthik Krishna Vasudevan, Ravindra Lote, Edward J...
IPPS
1997
IEEE
15 years 7 months ago
An Accurate Model for the Performance Analysis of Deterministic Wormhole Routing
We present a new analytical approach for the performance evaluation of asynchronous wormhole routing in k-ary n-cubes. Through the analysis of network flows, our methodology furni...
Bruno Ciciani, Claudio Paolucci, Michele Colajanni