Sciweavers

9521 search results - page 1891 / 1905
» Compiling with continuations, continued
Sort
View
PODC
2011
ACM
14 years 19 days ago
From bounded to unbounded concurrency objects and back
We consider the power of objects in the unbounded concurrency shared memory model, where there is an infinite set of processes and the number of processes active concurrently may...
Yehuda Afek, Adam Morrison, Guy Wertheim
PVLDB
2011
14 years 18 days ago
Albatross: Lightweight Elasticity in Shared Storage Databases for the Cloud using Live Data Migration
Database systems serving cloud platforms must serve large numbers of applications (or tenants). In addition to managing tenants with small data footprints, different schemas, and ...
Sudipto Das, Shoji Nishimura, Divyakant Agrawal, A...
GIS
2010
ACM
14 years 7 months ago
Towards location-based social networking services
Social networking applications have become very important web services that provide Internet-based platforms for their users to interact with their friends. With the advances in t...
Chi-Yin Chow, Jie Bao 0003, Mohamed F. Mokbel
SIGMETRICS
2011
ACM
237views Hardware» more  SIGMETRICS 2011»
14 years 18 days ago
Analysis of DCTCP: stability, convergence, and fairness
Cloud computing, social networking and information networks (for search, news feeds, etc) are driving interest in the deployment of large data centers. TCP is the dominant Layer 3...
Mohammad Alizadeh, Adel Javanmard, Balaji Prabhaka...
SIGMOD
2011
ACM
170views Database» more  SIGMOD 2011»
14 years 18 days ago
Warding off the dangers of data corruption with amulet
Occasional corruption of stored data is an unfortunate byproduct of the complexity of modern systems. Hardware errors, software bugs, and mistakes by human administrators can corr...
Nedyalko Borisov, Shivnath Babu, NagaPramod Mandag...
« Prev « First page 1891 / 1905 Last » Next »