Sciweavers

5450 search results - page 1028 / 1090
» Personalization of tagging systems
Sort
View
SASN
2005
ACM
14 years 3 months ago
On the security of group communication schemes based on symmetric key cryptosystems
Many emerging applications in both wired and wireless networks, such as information dissemination and distributed collaboration in an adversarial environment, need support of secu...
Shouhuai Xu
SC
2005
ACM
14 years 3 months ago
VSched: Mixing Batch And Interactive Virtual Machines Using Periodic Real-time Scheduling
We are developing Virtuoso, a system for distributed computing using virtual machines (VMs). Virtuoso must be able to mix batch and interactive VMs on the same physical hardware, ...
Bin Lin, Peter A. Dinda
SIGIR
2005
ACM
14 years 3 months ago
The maximum entropy method for analyzing retrieval measures
We present a model, based on the maximum entropy method, for analyzing various measures of retrieval performance such as average precision, R-precision, and precision-at-cutoffs....
Javed A. Aslam, Emine Yilmaz, Virgiliu Pavlu
SIGMETRICS
2005
ACM
117views Hardware» more  SIGMETRICS 2005»
14 years 3 months ago
Classifying scheduling policies with respect to higher moments of conditional response time
In addition to providing small mean response times, modern applications seek to provide users predictable service and, in some cases, Quality of Service (QoS) guarantees. In order...
Adam Wierman, Mor Harchol-Balter
SIGMETRICS
2005
ACM
118views Hardware» more  SIGMETRICS 2005»
14 years 3 months ago
Nearly insensitive bounds on SMART scheduling
We define the class of SMART scheduling policies. These are policies that bias towards jobs with small remaining service times, jobs with small original sizes, or both, with the ...
Adam Wierman, Mor Harchol-Balter, Takayuki Osogami
« Prev « First page 1028 / 1090 Last » Next »