Sciweavers

20 search results - page 2 / 4
» Lock allocation
Sort
View
VMCAI
2009
Springer
14 years 6 days ago
Finding Concurrency-Related Bugs Using Random Isolation
This paper describes the methods used in Empire, a tool to detect concurrency-related bugs, namely atomic-set serializability violations in Java programs. The correctness criterion...
Nicholas Kidd, Thomas W. Reps, Julian Dolby, Manda...
IPPS
2008
IEEE
13 years 12 months ago
Resource allocation in a client/server hybrid network for virtual world environments
The creation of a virtual world environment (VWE) has significant costs, such as maintenance of server rooms, server administration, and customer service. The initial development...
Luis Diego Briceno, Howard Jay Siegel, Anthony A. ...
FDG
2009
ACM
13 years 12 months ago
Robust resource allocation in a massive multiplayer online gaming environment
The environment considered in this research is a massive multiplayer online gaming (MMOG) environment. Each user controls an avatar (an image that represents and is manipulated by...
Luis Diego Briceno, Howard Jay Siegel, Anthony A. ...
ESORICS
2011
Springer
12 years 5 months ago
Supporting Concurrency in Private Data Outsourcing
Abstract. With outsourcing emerging as a successful paradigm for delegating data and service management to third parties, the problem of guaranteeing proper privacy protection agai...
Sabrina De Capitani di Vimercati, Sara Foresti, St...
ISPDC
2005
IEEE
13 years 11 months ago
Active Zero-copy: A performance study of non-deterministic messaging
Zero-copy communication exchanges the messages among the buffers that are allocated and locked before the communication itself. This communication style fits into applications th...
Shinichi Yamagiwa, Keiichi Aoki, Koichi Wada