Sciweavers

1040 search results - page 14 / 208
» Resource Usage Verification
Sort
View
CLUSTER
2003
IEEE
14 years 3 months ago
Improving Performance of a Dynamic Load Balancing System by Using Number of Effective Tasks
Efficient resource usage is a key to achieving better performance in cluster systems. Previously, most research in this area has focused on balancing the load of each node to use...
Min Choi, Jung-Lok Yu, Hojoong Kim, Seung Ryoul Ma...
ICCAD
1994
IEEE
105views Hardware» more  ICCAD 1994»
14 years 1 months ago
Register assignment through resource classification for ASIP microcode generation
Application Specific Instruction-Set Processors (ASIPs) offer designers the ability for high-speed data and control processing with the added flexibility needed for late design sp...
Clifford Liem, Trevor C. May, Pierre G. Paulin
CCGRID
2008
IEEE
13 years 11 months ago
Formal Verification of a Grid Resource Allocation Protocol
As the adoption of grid technology moves from science to industry, new requirements arise. In todays grid middlewares, the notion of paying for a job is a secondary requirement. In...
Mathias Dalheimer, Franz-Josef Pfreundt, Peter Mer...
OTM
2005
Springer
14 years 3 months ago
On the Usage of Global Document Occurrences in Peer-to-Peer Information Systems
There exist a number of approaches for query processing in Peer-to-Peer information systems that efficiently retrieve relevant information from distributed peers. However, very few...
Odysseas Papapetrou, Sebastian Michel, Matthias Be...
CSFW
2010
IEEE
14 years 1 months ago
Constraining Credential Usage in Logic-Based Access Control
—Authorization logics allow concise specification of flexible access-control policies, and are the basis for logic-based access-control systems. In such systems, resource owner...
Lujo Bauer, Limin Jia, Divya Sharma