Sciweavers

909 search results - page 22 / 182
» The Economics of Large-Memory Computations
Sort
View
CORR
2011
Springer
196views Education» more  CORR 2011»
13 years 1 months ago
Privacy-Enhanced Reputation-Feedback Methods to Reduce Feedback Extortion in Online Auctions
In this paper, we study methods for improving the utility and privacy of reputation scores for online auctions, such as used in eBay, so as to reduce the effectiveness of feedbac...
Michael T. Goodrich, Florian Kerschbaum
ICPPW
2009
IEEE
13 years 7 months ago
Characterizing the Performance of
Using Linux for high-performance applications on the compute nodes of IBM Blue Gene/P is challenging because of TLB misses and difficulties with programming the network DMA engine...
Kazutomo Yoshii, Kamil Iskra, Harish Naik, Pete Be...
ICCSA
2004
Springer
14 years 3 months ago
A Market-Based Scheduler for JXTA-Based Peer-to-Peer Computing System
Peer-to-Peer (P2P) computing is said to be the next wave of computing after client-server and web-based computing. It provides an opportunity to harness a lot of idle peer-resource...
Tan Tien Ping, Gian Chand Sodhy, Chan Huah Yong, F...
CHI
2009
ACM
14 years 4 months ago
It's not easy being green: understanding home computer power management
Although domestic computer use is increasing, most efforts to reduce energy use through improved power management have focused on computers in the workplace. We studied 20 househo...
Marshini Chetty, A. J. Bernheim Brush, Brian Meyer...
CHI
2011
ACM
13 years 1 months ago
Publics in practice: ubiquitous computing at a shelter for homeless mothers
Today, commodity technologies like mobile phones—once symbols of status and wealth—have become deeply woven into social and economic participation in Western society. Despite ...
Christopher A. Le Dantec, Robert G. Farrell, Jim C...