Sciweavers

244 search results - page 5 / 49
» The Case for Efficient File Access Pattern Modeling
Sort
View
ICS
2010
Tsinghua U.
13 years 9 months ago
InterferenceRemoval: removing interference of disk access for MPI programs through data replication
As the number of I/O-intensive MPI programs becomes increasingly large, many efforts have been made to improve I/O performance, on both software and architecture sides. On the sof...
Xuechen Zhang, Song Jiang
GIS
2008
ACM
14 years 8 months ago
Detecting single file movement
d Abstract] K. Buchin Dept. Computer Science Utrecht University The Netherlands buchin@cs.uu.nl M. Buchin Dept. Computer Science Utrecht University The Netherlands maike@cs.uu.nl ...
Kevin Buchin, Maike Buchin, Joachim Gudmundsson
EDBT
2004
ACM
155views Database» more  EDBT 2004»
14 years 7 months ago
Processing Unions of Conjunctive Queries with Negation under Limited Access Patterns
We study the problem of answering queries over sources with limited access patterns. The problem is to decide whether a given query Q is feasible, i.e., equivalent to an executable...
Alan Nash, Bertram Ludäscher
ARCS
2005
Springer
14 years 26 days ago
A File System for System Programming in Ubiquitous Computing
In Ubiquitous computing small embedded sensor and computing nodes are the main enabling technologies. System programming for such small embedded systems is a challenging task invol...
Christian Decker, Michael Beigl, Albert Krohn
ASMTA
2008
Springer
113views Mathematics» more  ASMTA 2008»
13 years 9 months ago
Exact Sojourn Time Distribution in an Online IPTV Recording System
In this paper we analytically derive the sojourn time of a user accessing an online IPTV recording service. Basically, the system consists of a server (or server farm) and the band...
Tobias Hoßfeld, Kenji Leibnitz, Marie-Ange R...