Sciweavers

1558 search results - page 304 / 312
» Scalable work stealing
Sort
View
ALGORITHMICA
2004
132views more  ALGORITHMICA 2004»
13 years 8 months ago
A General Model for Authenticated Data Structures
Query answers from on-line databases can easily be corrupted by hackers or malicious database publishers. Thus it is important to provide mechanisms which allow clients to trust th...
Charles U. Martel, Glen Nuckolls, Premkumar T. Dev...
TWC
2008
154views more  TWC 2008»
13 years 8 months ago
MEERA: Cross-Layer Methodology for Energy Efficient Resource Allocation in Wireless Networks
Abstract-- In many portable devices, wireless network interfaces consume upwards of 30% of scarce system energy. Reducing the transceiver's power consumption to extend the sys...
Sofie Pollin, Rahul Mangharam, Bruno Bougard, Lies...
COMCOM
2004
118views more  COMCOM 2004»
13 years 8 months ago
SLA-based QoS pricing in DiffServ networks
The availability of high-speed transmission media and networking equipment in contemporary networks, as well as the evolution of quality-demanding applications has focused researc...
Christos Bouras, Afrodite Sevasti
COMPUTER
2002
121views more  COMPUTER 2002»
13 years 8 months ago
The Interspace: Concept Navigation Across Distributed Communities
ectly support interaction with abstraction. Using technologies that go beyond searching individual repositories to analyzing and correlating knowledge across multiple sources and s...
Bruce R. Schatz
PE
2007
Springer
114views Optimization» more  PE 2007»
13 years 8 months ago
Performance analysis of BitTorrent-like systems with heterogeneous users
Among all peer-to-peer (P2P) systems, BitTorrent seems to be the most prevalent one. This success has drawn a great deal of research interest on the system. In particular, there h...
Wei-Cherng Liao, Fragkiskos Papadopoulos, Konstant...