Sciweavers

807 search results - page 153 / 162
» Deploying and evaluating a location-aware system
Sort
View
ICDE
2010
IEEE
197views Database» more  ICDE 2010»
15 years 9 months ago
Monitoring Continuous State Violation in Datacenters: Exploring the Time Dimension
Monitoring global states of an application deployed over distributed nodes becomes prevalent in today's datacenters. State monitoring requires not only correct monitoring resu...
Shicong Meng, Ting Wang, Ling Liu
EUROSYS
2010
ACM
15 years 6 months ago
Kivati: Fast Detection and Prevention of Atomicity Violations
Bugs in concurrent programs are extremely difficult to find and fix during testing. In this paper, we propose Kivati, which can efficiently detect and prevent atomicity violat...
Lee Chew, David Lie
MIDDLEWARE
2009
Springer
15 years 4 months ago
Heterogeneous Gossip
Abstract. Gossip-based information dissemination protocols are considered easy to deploy, scalable and resilient to network dynamics. Loadbalancing is inherent in these protocols a...
Davide Frey, Rachid Guerraoui, Anne-Marie Kermarre...
SIGCOMM
2009
ACM
15 years 4 months ago
DIRC: increasing indoor wireless capacity using directional antennas
The demand for wireless bandwidth in indoor environments such as homes and offices continues to increase rapidly. Although wireless technologies such as MIMO can reach link throug...
Xi Liu, Anmol Sheth, Michael Kaminsky, Konstantina...
HPDC
2008
IEEE
15 years 4 months ago
Improving peer connectivity in wide-area overlays of virtual workstations
Self-configuring virtual networks rely on structured P2P routing to provide seamless connectivity among nodes through overlay routing of virtual IP packets, support decentralized...
Arijit Ganguly, P. Oscar Boykin, David Wolinsky, R...