Sciweavers

1558 search results - page 91 / 312
» Scalable work stealing
Sort
View
OOPSLA
2004
Springer
14 years 3 months ago
RUBiS revisited: why J2EE benchmarking is hard
We have replicated the experiments of Cecchet et al. detailed in ”Performance and Scalability of EJB Applications” at OOPSLA ’02. We report on our experiences configuring, ...
William Pugh, Jaime Spacco
FPL
2000
Springer
143views Hardware» more  FPL 2000»
14 years 1 months ago
Memory Access Schemes for Configurable Processors
Abstract. This work discusses the Memory Architecture for Reconfigurable Computers (MARC), a scalable, device-independent memory interface that supports both irregular (via configu...
Holger Lange, Andreas Koch
CSMR
2009
IEEE
14 years 4 months ago
Visualizing Multivariate Attributes on Software Diagrams
Software architecture diagrams and metrics are wellknown and heavily used in many areas in software engineering. However, they are rarely combined in one (visual) representation. ...
Heorhiy Byelas, Alexandru Telea
NDSS
1997
IEEE
14 years 2 months ago
Distributed Authentication in Kerberos Using Public Key Cryptography
In this work we describe a method for fully distributed authentication using public key cryptography within the Kerberos ticket framework. By distributing most of the authenticati...
Marvin A. Sirbu, John C.-I. Chuang
SAC
1999
ACM
14 years 2 months ago
The Distributed Programming Environment on the Internet
A computing using distributed objects provides a flexible and scalable programming on the distributed and parallel programming environment. People work together on a scientific re...
Chang-Hyun Jo, Jea Gi Son, Younwoo Kang, Phill Soo...