Sciweavers

916 search results - page 27 / 184
» Performance Evaluation of Scheduling Policies for Volunteer ...
Sort
View
ATAL
2009
Springer
14 years 2 months ago
Computing optimal randomized resource allocations for massive security games
Predictable allocations of security resources such as police officers, canine units, or checkpoints are vulnerable to exploitation by attackers. Recent work has applied game-theo...
Christopher Kiekintveld, Manish Jain, Jason Tsai, ...
WIOPT
2006
IEEE
14 years 1 months ago
Flow-level stability of channel-aware scheduling algorithms
— Channel-aware scheduling strategies provide an effective mechanism for improving the throughput performance in wireless data networks by exploiting channel fluctuations. The p...
Sem C. Borst, Matthieu Jonckheere
PVLDB
2008
124views more  PVLDB 2008»
13 years 7 months ago
Scheduling shared scans of large data files
We study how best to schedule scans of large data files, in the presence of many simultaneous requests to a common set of files. The objective is to maximize the overall rate of p...
Parag Agrawal, Daniel Kifer, Christopher Olston
IPPS
2000
IEEE
14 years 8 days ago
Improving Throughput and Utilization in Parallel Machines through Concurrent Gang
In this paper we propose a new class of scheduling policies, dubbed Concurrent Gang, that combines the advantages of gang scheduling for communication and synchronization intensiv...
Fabrício Alves Barbosa da Silva, Isaac D. S...
DMIN
2006
123views Data Mining» more  DMIN 2006»
13 years 9 months ago
Novel Evaluation Framework of Intrusion Detection Systems with Respect to Security Policies
Intrusion Detection System is an integral component of the computer security infrastructure. It is usually put in place to detect computer security policy violations. While its ro...
Negmat Mullodzhanov