Sciweavers

5234 search results - page 998 / 1047
» Simulation of Computer Network Attacks
Sort
View
126
Voted
EUROPAR
2009
Springer
15 years 7 months ago
Real-Time Issues in Live Migration of Virtual Machines
This paper addresses the issue of how to meet the strict timing constraints of (soft) real-time virtualized applications while the Virtual Machine (VM) hosting them is undergoing a...
Fabio Checconi, Tommaso Cucinotta, Manuel Stein
ASPDAC
2007
ACM
110views Hardware» more  ASPDAC 2007»
15 years 6 months ago
Fast Placement Optimization of Power Supply Pads
Power grid networks in VLSI circuits are required to provide adequate input supply to ensure reliable performance. In this paper, we propose algorithms to find the placement of pow...
Yu Zhong, Martin D. F. Wong
AIIDE
2007
15 years 4 months ago
SquadSmart: Hierarchical Planning and Coordinated Plan Execution for Squads of Characters
This paper presents an application of Hierarchical Transition Network (HTN) planning to a squad-based military simulation. The hierarchical planner produces collaborative plans fo...
Peter Gorniak, Ian Davis
ICWS
2008
IEEE
15 years 3 months ago
An Adaptive Service Selection Approach to Service Composition
In service computing, the behavior of a service may evolve. When an organization develops a service-oriented application in which certain services are provided by external partner...
Lijun Mei, Wing Kwong Chan, T. H. Tse
JCM
2006
112views more  JCM 2006»
15 years 2 months ago
A Peer-to-Peer Cooperation Enhancement Scheme and its Performance Analysis
The performance of peer-to-peer systems depends on the level of cooperation of the system's participants. While most existing peer-to-peer architectures have assumed that user...
Wei-Cherng Liao, Fragkiskos Papadopoulos, Konstant...