Sciweavers

175 search results - page 28 / 35
» Password policy simulation and analysis
Sort
View
JSSPP
2007
Springer
14 years 3 months ago
A Self-optimized Job Scheduler for Heterogeneous Server Clusters
Heterogeneous clusters and grid infrastructures are becoming increasingly popular. In these computing infrastructures, machines have different resources, including memory sizes, d...
Elad Yom-Tov, Yariv Aridor
HICSS
2003
IEEE
127views Biometrics» more  HICSS 2003»
14 years 2 months ago
Testing Design of a Social Innovation The Environmental Mitigation Banking System
This paper attempts to evaluate the performance of an environmental mitigation banking system operating under different regulatory. Pricing and subsidization policies using system...
Khalid Saeed, Atsushi Fukuda
APWEB
2010
Springer
14 years 1 months ago
Crawling Online Social Graphs
—Extensive research has been conducted on top of online social networks (OSNs), while little attention has been paid to the data collection process. Due to the large scale of OSN...
Shaozhi Ye, Juan Lang, Shyhtsun Felix Wu
DIALM
2000
ACM
112views Algorithms» more  DIALM 2000»
14 years 1 months ago
A decision-theoretic approach to resource allocation in wireless multimedia networks
The allocation of scarce spectral resources to support as many user applications as possible while maintaining reasonable quality of service is a fundamental problem in wireless c...
Zygmunt J. Haas, Joseph Y. Halpern, Erran L. Li, S...
INFOCOM
1999
IEEE
14 years 1 months ago
Multicast-Based Inference of Network-Internal Characteristics: Accuracy of Packet Loss Estimation
Abstract--We explore the use of end-to-end multicast traffic as measurement probes to infer network-internal characteristics. We have developed in an earlier paper [2] a Maximum Li...
Ramón Cáceres, Nick G. Duffield, Jos...