Sciweavers

2407 search results - page 336 / 482
» Design considerations for network processor operating system...
Sort
View
IISWC
2006
IEEE
15 years 10 months ago
Characterization of Error-Tolerant Applications when Protecting Control Data
Soft errors have become a significant concern and recent studies have measured the “architectural vulnerability factor” of systems to such errors, or conversely, the potentia...
Darshan D. Thaker, Diana Franklin, John Oliver, Su...
SOSP
2007
ACM
16 years 26 days ago
Dynamo: amazon's highly available key-value store
Reliability at massive scale is one of the biggest challenges we face at Amazon.com, one of the largest e-commerce operations in the world; even the slightest outage has significa...
Giuseppe DeCandia, Deniz Hastorun, Madan Jampani, ...
133
Voted
SAC
2009
ACM
15 years 8 months ago
Impact of function inlining on resource-constrained embedded systems
With the development of computer systems, function inlining schemes were used to reduce execution time while increasing codes. In embedded systems such as wireless sensor nodes, t...
Bongjae Kim, Sangho Yi, Yookun Cho, Jiman Hong
171
Voted
DSS
2000
105views more  DSS 2000»
15 years 3 months ago
Dynamic behavior of differential pricing and quality of service options for the internet
Abstract. The simple model on which the Internet has operated, with all packets treated equally, and charges only for access links to the network, has contributed to its explosive ...
Peter C. Fishburn, Andrew M. Odlyzko
148
Voted
WMRD
1990
15 years 8 months ago
Replication in Ficus Distributed File Systems
Ficus is a replicated general ling environment for Unix intended to scale to very large nationwide networks. The system employs an optimistic one copy availability" model in ...
Gerald J. Popek, Richard G. Guy, Thomas W. Page Jr...