Sciweavers

1040 search results - page 21 / 208
» Resource Usage Verification
Sort
View
CASSIS
2004
Springer
14 years 3 months ago
Mobile Resource Guarantees for Smart Devices
We present the Mobile Resource Guarantees framework: a system for ensuring that downloaded programs are free from run-time violations of resource bounds. Certificates are attached...
David Aspinall, Stephen Gilmore, Martin Hofmann, D...
ADAEUROPE
2008
Springer
13 years 11 months ago
On the Timed Automata-Based Verification of Ravenscar Systems
The Ravenscar profile for Ada enforces several restrictions on the usage of general-purpose tasking constructs, thereby facilitating most analysis tasks and in particular functiona...
Iulian Ober, Nicolas Halbwachs
IM
2003
13 years 11 months ago
A Revenue-based Model for Making Resource Investment Decisions in IP Networks
: Capacity planning is a critical task in network management. It identifies how much capacity is needed to match future traffic demand. It directly affects customer satisfaction ...
Srinivasan Jagannathan, Jörn Altmann, Lee Rho...
EUROPAR
2009
Springer
14 years 4 months ago
Provider-Independent Use of the Cloud
Abstract. Utility computing offers researchers and businesses the potential of significant cost-savings in that it is possible for them to match the cost of their computing and s...
Terence J. Harmer, Peter Wright, Christina Cunning...
CORR
2007
Springer
89views Education» more  CORR 2007»
13 years 9 months ago
Hardware Support for QoS-based Function Allocation in Reconfigurable Systems
This contribution presents a new approach for allocating suitable function-implementation variants depending on given quality-of-service functionrequirements for run-time reconfig...
Michael Ullmann, Wansheng Jin, Jürgen Becker