Sciweavers

1558 search results - page 192 / 312
» Scalable work stealing
Sort
View
GLOBECOM
2007
IEEE
14 years 4 months ago
Hierarchical Provisioning Algorithm for Virtual Private Networks Using the Hose Model
— Virtual Private Networks (VPN) provide a secure and reliable communication between customer sites over a shared network. Two models were proposed for the service provisioning i...
Monia Ghobadi, Sudhakar Ganti, Gholamali C. Shoja
HPDC
2007
IEEE
14 years 4 months ago
Using content-addressable networks for load balancing in desktop grids
Desktop grids combine Peer-to-Peer and Grid computing techniques to improve the robustness, reliability and scalability of job execution infrastructures. However, efficiently mat...
Jik-Soo Kim, Peter J. Keleher, Michael A. Marsh, B...
ICAC
2007
IEEE
14 years 4 months ago
A Regression-Based Analytic Model for Dynamic Resource Provisioning of Multi-Tier Applications
— The multi-tier implementation has become the industry standard for developing scalable client-server enterprise applications. Since these applications are performance sensitive...
Qi Zhang, Ludmila Cherkasova, Evgenia Smirni
ICNSC
2007
IEEE
14 years 4 months ago
Queue Length Based Internet Congestion Control
— In this paper we present new queue length based Internet congestion control protocol which is shown through simulations to work effectively. The control objective is to regulat...
Marios Lestas, Andreas Pitsillides, Petros A. Ioan...
INFOCOM
2007
IEEE
14 years 4 months ago
Malicious Users in Unstructured Networks
—Unstructured networks (like ad-hoc or peer-to-peer networks) are networks without centralized control of their operation. Users make local decisions regarding whether to follow ...
George Theodorakopoulos, John S. Baras