Sciweavers

1040 search results - page 22 / 208
» Resource Usage Verification
Sort
View
WORDS
2003
IEEE
14 years 3 months ago
Decentralized Resource Management and Fault-Tolerance for Distributed CORBA Applications
Assigning an application’s fault-tolerance properties (e.g., replication style, checkpointing frequency) statically, and in an arbitrary manner, can lead to the application not ...
Carlos F. Reverte, Priya Narasimhan
IPTPS
2003
Springer
14 years 2 months ago
Enforcing Fair Sharing of Peer-to-Peer Resources
Cooperative peer-to-peer applications are designed to share the resources of each computer in an overlay network for the common good of everyone. However, users do not necessarily...
Tsuen-Wan Ngan, Dan S. Wallach, Peter Druschel
EMSOFT
2010
Springer
13 years 7 months ago
Reducing stack with intra-task threshold priorities in real-time systems
In the design of hard real-time systems, the feasibility of the task set is one of the primary concerns. However, in embedded systems with scarce resources, optimizing resource us...
Gang Yao, Giorgio C. Buttazzo
FMCAD
2000
Springer
14 years 1 months ago
Model Checking Synchronous Timing Diagrams
Abstract. Model checking is an automated approach to the formal verification of hardware and software. To allow model checking tools to be used by the hardware or software designer...
Nina Amla, E. Allen Emerson, Robert P. Kurshan, Ke...
ICPADS
2006
IEEE
14 years 3 months ago
Policy-Directed Data Movement in Grids
One of the guiding principles of the Grid is local (site) autonomy. Resource owners maintain control over their resources even when those resources are part of a larger Grid. In o...
Jun Feng, Lingling Cui, Glenn S. Wasson, Marty Hum...