Sciweavers

54 search results - page 10 / 11
» The Worst Page-Replacement Policy
Sort
View
WMASH
2003
ACM
14 years 4 months ago
Secure authentication system for public WLAN roaming
A serious challenge for seamless roaming between independent wireless LANs (WLANs) is how best to confederate the various WLAN service providers, each having different trust relat...
Yasuhiko Matsunaga, Ana Sanz Merino, Takashi Suzuk...
EUROCRYPT
1997
Springer
14 years 3 months ago
The GCHQ Protocol and Its Problems
The UK government is fielding an architecture for secure electronic mail based on the NSA’s Message Security Protocol, with a key escrow scheme inspired by Diffie-Hellman. Attem...
Ross J. Anderson, Michael Roe
JSSPP
1997
Springer
14 years 3 months ago
An Experimental Evaluation of Processor Pool-Based Scheduling for Shared-Memory NUMA Multiprocessors
In this paper we describe the design, implementation and experimental evaluation of a technique for operating system schedulers called processor pool-based scheduling [51]. Our tec...
Tim Brecht
ICMAS
1998
14 years 7 days ago
A Market Protocol for Decentralized Task Allocation
We present a decentralized, asynchronous market protocol for allocating and scheduling tasks among agents that contend for scarce resources, constrained by a hierarchical task dep...
William E. Walsh, Michael P. Wellman
GECON
2008
Springer
152views Business» more  GECON 2008»
13 years 12 months ago
The Power of Preemption in Economic Online Markets
Abstract. In distributed computer networks where resources are under decentralized control, selfish users will generally not work towards one common goal, such as maximizing the o...
Lior Amar, Ahuva Mu'alem, Jochen Stößer