Sciweavers

1558 search results - page 5 / 312
» Scalable work stealing
Sort
View
SP
2002
IEEE
147views Security Privacy» more  SP 2002»
13 years 9 months ago
CX: A scalable, robust network for parallel computing
CX, a network-based computational exchange, is presented. The system's design integrates variations of ideas from other researchers, such as work stealing, non-blocking tasks...
Peter R. Cappello, Dimitros Mourloukos
SPAA
1998
ACM
14 years 1 months ago
Analyses of Load Stealing Models Based on Differential Equations
In this paper we develop models for and analyze several randomized work stealing algorithms in a dynamic setting. Our models represent the limiting behavior of systems as the numb...
Michael Mitzenmacher
IEEEMM
2006
54views more  IEEEMM 2006»
13 years 9 months ago
MIDI to SP-MIDI Transcoding Using Phrase Stealing
The Musical Instrument Digital Interface (MIDI) is a popular music format used in mu ltimedia messaging service, such as mobile phone ringtones. Scalable Polyphony MIDI (SP-MIDI) ...
Simon Lui, Andrew Horner, Lydia Ayers
IWDC
2001
Springer
101views Communications» more  IWDC 2001»
14 years 2 months ago
Resource Stealing in Endpoint Controlled Multi-class Networks
Abstract. Endpoint admission control is a mechanism for achieving scalable services by pushing quality-of-service functionality to end hosts. In particular, hosts probe the network...
Susana Sargento, Rui Valadas, Edward W. Knightly
JAVA
2001
Springer
14 years 2 months ago
A scalable, robust network for parallel computing
CX, a network-based computational exchange, is presented. The system’s design integrates variations of ideas from other researchers, such as work stealing, non-blocking tasks, e...
Peter R. Cappello, Dimitros Mourloukos