Sciweavers

5470 search results - page 196 / 1094
» Distributed Control Lab
Sort
View
121
Voted
ICS
1989
Tsinghua U.
15 years 7 months ago
Control flow optimization for supercomputer scalar processing
Control intensive scalar programs pose a very different challenge to highly pipelined supercomputers than vectorizable numeric applications. Function call/return and branch instru...
Pohua P. Chang, Wen-mei W. Hwu
98
Voted
ATAL
2006
Springer
15 years 7 months ago
History-based traffic control
What if traffic lights gave you a break after you've spent a long time waiting in traffic elsewhere? In this paper we examine a variety of multi-agent traffic light controlle...
Gabriel Catalin Balan, Sean Luke
136
Voted
WPES
2006
ACM
15 years 9 months ago
A privacy-preserving interdomain audit framework
Recent trends in Internet computing have led to the popularization of many forms of virtual organizations. Examples include supply chain management, grid computing, and collaborat...
Adam J. Lee, Parisa Tabriz, Nikita Borisov
122
Voted
INFOCOM
2005
IEEE
15 years 9 months ago
Connection admission control for flow level QoS in bufferless models
Abstract— Admission control algorithms used in access networks for multiplexed voice sources are typically based on aggregated system characteristics, such as aggregate loss prob...
Sándor Rácz, Tamás Jakabfy, J...
128
Voted
ICDCSW
2003
IEEE
15 years 9 months ago
Privilege Delegation and Agent-Oriented Access Control in Naplet
Access control in existing Java-based mobile agents is mostly based on code source due to limitations of early Java security architecture. That is, authorization is based on where...
Cheng-Zhong Xu, Song Fu