Sciweavers

581 search results - page 88 / 117
» policy 2009
Sort
View
DAC
2009
ACM
14 years 3 months ago
Throughput optimal task allocation under thermal constraints for multi-core processors
It is known that temperature gradients and thermal hotspots affect the reliability of microprocessors. Temperature is also an important constraint when maximizing the performance...
Vinay Hanumaiah, Ravishankar Rao, Sarma B. K. Vrud...
PADS
2009
ACM
14 years 3 months ago
Real-Time Security Exercises on a Realistic Interdomain Routing Experiment Platform
We use a realistic interdomain routing experiment platform to conduct real-time attack and defense exercises for training purposes. Our interdomain routing experiment platform int...
Yue Li, Michael Liljenstam, Jason Liu
SAC
2009
ACM
14 years 3 months ago
An implementation of the earliest deadline first algorithm in Linux
Recently, many projects have been started to introduce some real-time mechanisms into general purpose operating systems (GPOS) in order to make them capable of providing the users...
Dario Faggioli, Michael Trimarchi, Fabio Checconi
CCS
2009
ACM
14 years 3 months ago
Membership-concealing overlay networks
We introduce the concept of membership-concealing overlay networks (MCONs), which hide the real-world identities of participants. We argue that while membership concealment is ort...
Eugene Y. Vasserman, Rob Jansen, James Tyra, Nicho...
EDBT
2009
ACM
104views Database» more  EDBT 2009»
14 years 3 months ago
A query processor for prediction-based monitoring of data streams
Networks of sensors are used in many different fields, from industrial applications to surveillance applications. A common feature of these applications is the necessity of a mo...
Sergio Ilarri, Ouri Wolfson, Eduardo Mena, Arantza...