Sciweavers

1558 search results - page 214 / 312
» Scalable work stealing
Sort
View
SIGECOM
1999
ACM
105views ECommerce» more  SIGECOM 1999»
14 years 2 months ago
Nark: receiver-based multicast non-repudiation and key management
The goal of this work is to separately control individual secure sessions between unlimited pairs of multicast receivers and senders while preserving the scalability of receiver i...
Bob Briscoe, Ian Fairman
ICDCS
1999
IEEE
14 years 2 months ago
Run-time Detection in Parallel and Distributed Systems: Application to Safety-Critical Systems
There is growing interest in run-time detection as parallel and distributed systems grow larger and more complex. This work targets run-time analysis of complex, interactive scien...
Beth Plale, Karsten Schwan
ICPP
1999
IEEE
14 years 2 months ago
Access Descriptor Based Locality Analysis for Distributed-Shared Memory Multiprocessors
Most of today's multiprocessors have a DistributedShared Memory (DSM) organization, which enables scalability while retaining the convenience of the shared-memory programming...
Angeles G. Navarro, Rafael Asenjo, Emilio L. Zapat...
INFOCOM
1999
IEEE
14 years 2 months ago
Globally Progressive Interactive Web Delivery
- This paper suggests that since web browsing is an interactive process and downloading a web page can take several seconds to several minutes over slow links, the information pres...
Jeffrey M. Gilbert, Robert W. Brodersen
DEXA
1999
Springer
99views Database» more  DEXA 1999»
14 years 2 months ago
Distributed Global Transaction Support for Workflow Management Applications
Workflow management systems require advanced transaction support to cope with their inherently long-running processes. The recent trend to distribute workflow executions requires ...
Jochem Vonk, Paul W. P. J. Grefen, Erik Boertjes, ...