Sciweavers

11234 search results - page 1791 / 2247
» A Microsurgery Simulation System
Sort
View
HPDC
2008
IEEE
15 years 11 months ago
Combining batch execution and leasing using virtual machines
As cluster computers are used for a wider range of applications, we encounter the need to deliver resources at particular times, to meet particular deadlines, and/or at the same t...
Borja Sotomayor, Kate Keahey, Ian T. Foster
MICRO
2008
IEEE
124views Hardware» more  MICRO 2008»
15 years 11 months ago
SHARK: Architectural support for autonomic protection against stealth by rootkit exploits
Rootkits have become a growing concern in cyber-security. Typically, they exploit kernel vulnerabilities to gain root privileges of a system and conceal malware’s activities fro...
Vikas R. Vasisht, Hsien-Hsin S. Lee
AINA
2007
IEEE
15 years 11 months ago
Cost-Function-Based Network Selection Strategy in Integrated Wireless and Mobile Networks
—Wireless and mobile networks have experienced great success over the past few years. However, any single type of wireless and mobile network cannot provide all types of services...
Wei Shen, Qing-An Zeng
ICDCS
2007
IEEE
15 years 11 months ago
An Asymmetric Quorum-based Power Saving Protocol for Clustered Ad Hoc Networks
Clustering in Mobile Ad Hoc Networks (MANETs) has shown to be a promising technique to ensure the scalability and efficiency of various communication protocols. Since stations in...
Shan-Hung Wu, Chung-Min Chen, Ming-Syan Chen
ISCA
2007
IEEE
146views Hardware» more  ISCA 2007»
15 years 11 months ago
Virtual hierarchies to support server consolidation
Server consolidation is becoming an increasingly popular technique to manage and utilize systems. This paper develops CMP memory systems for server consolidation where most sharin...
Michael R. Marty, Mark D. Hill
« Prev « First page 1791 / 2247 Last » Next »