Sciweavers

3052 search results - page 147 / 611
» Weakly Distributive Domains
Sort
View
PDP
1996
IEEE
15 years 8 months ago
Application-Dependent Performability Evaluation of Fault-Tolerant Multiprocessors
A case study of performance and dependability evaluation of fault-tolerant multiprocessors is presented. Two specific architectures are analyzed taking into account system functio...
Stefan Dalibor, A. Hein, Wolfgang Hohl
USM
2000
15 years 8 months ago
Trade-offs in a Secure Jini Service Architecture
Jini is an infrastructure built on top of the mobile code facilities of the Java programming language enabling clients and services to spontaneously engage in arbitrary usage scena...
Peer Hasselmeyer, Roger Kehr, Marco Voß
JSSPP
2010
Springer
15 years 2 months ago
A Greedy Double Auction Mechanism for Grid Resource Allocation
To improve the resource utilization and satisfy more users, a Greedy Double Auction Mechanism(GDAM) is proposed to allocate resources in grid environments. GDAM trades resources at...
Ding Ding, Siwei Luo, Zhan Gao
NAACL
2010
15 years 2 months ago
Improved Extraction Assessment through Better Language Models
A variety of information extraction techniques rely on the fact that instances of the same relation are "distributionally similar," in that they tend to appear in simila...
Arun Ahuja, Doug Downey
CSREASAM
2009
15 years 2 months ago
A Secure Certificate for Secure Group Communication
- Security is a primary concern in group communication, and secure authentication is essential to establishing a secure group communication. Most conventional authentications consi...
Sunghyuck Hong