Sciweavers

370 search results - page 42 / 74
» An Approach to Ad hoc Cloud Computing
Sort
View
ABIALS
2008
Springer
15 years 4 months ago
Anticipative Control of Voluntary Action: Towards a Computational Model
Abstract. Human action is goal-directed and must thus be guided by anticipations of wanted action effects. How anticipatory action control is possible and how it can emerge from ex...
Pascal Haazebroek, Bernhard Hommel
SIGMOD
2011
ACM
170views Database» more  SIGMOD 2011»
14 years 18 days ago
Warding off the dangers of data corruption with amulet
Occasional corruption of stored data is an unfortunate byproduct of the complexity of modern systems. Hardware errors, software bugs, and mistakes by human administrators can corr...
Nedyalko Borisov, Shivnath Babu, NagaPramod Mandag...
AINA
2010
IEEE
15 years 2 months ago
Iterative Route Discovery in AODV
Abstract—Several protocols for ad hoc network try to reduce redundancy as an effective measure against broadcast problems. Though these protocols ensure good performance in a fav...
Nashid Shahriar, Syed Ashker Ibne Mujib, Arup Rato...
CLOUD
2010
ACM
15 years 2 months ago
The case for PIQL: a performance insightful query language
Large-scale, user-facing applications are increasingly moving from relational databases to distributed key/value stores for high-request-rate, low-latency workloads. Often, this m...
Michael Armbrust, Nick Lanham, Stephen Tu, Armando...
AC
2003
Springer
15 years 3 months ago
System Support for Pervasive Applications
To make pervasive computing a reality, we need better system support for building, deploying, and using pervasive applications. In this paper, we identify the unique requirements ...
Robert Grimm, Brian N. Bershad