Sciweavers

1040 search results - page 158 / 208
» Resource Usage Verification
Sort
View
124
Voted
INFOCOM
2005
IEEE
15 years 8 months ago
A quantitative study of authentication and QoS in wireless IP networks
— With the increasing demand for secure and high-quality communications in public access wireless IP networks, it is very important to have an in-depth understanding of the relat...
Wei Liang, Wenye Wang
159
Voted
MTV
2005
IEEE
138views Hardware» more  MTV 2005»
15 years 8 months ago
Diagnosing Faulty Functional Units in Processors by Using Automatically Generated Test Sets
Microprocessor technology is increasingly used for many applications; the large market volumes call for cost containment in the production phase. Process yield for processor produ...
Paolo Bernardi, Ernesto Sánchez, Massimilia...
130
Voted
P2P
2005
IEEE
110views Communications» more  P2P 2005»
15 years 8 months ago
Presence-Based Availability and P2P Systems
The availability of a P2P service is a function of the individual peers’ availabilities, and it is often desirable to estimate how available a particular P2P service will be giv...
Richard J. Dunn, John Zahorjan, Steven D. Gribble,...
PDP
2005
IEEE
15 years 8 months ago
Distributed Data Collection through Remote Probing in Windows Environments
Distributed Data Collector (DDC) is a framework to ease and automate repetitive executions of console applications (probes) over a set of LAN networked Windows personal computers....
Patrício Domingues, Paulo Marques, Lu&iacut...
112
Voted
VEE
2005
ACM
130views Virtualization» more  VEE 2005»
15 years 8 months ago
The entropia virtual machine for desktop grids
Desktop distributed computing allows companies to exploit the idle cycles on pervasive desktop PC systems to increase the available computing power by orders of magnitude (10x - 1...
Brad Calder, Andrew A. Chien, Ju Wang, Don Yang