Sciweavers

2488 search results - page 159 / 498
» Distributed Non-binary Constraints
Sort
View
159
Voted
HPDC
2002
IEEE
15 years 10 months ago
Distributed Computing with Load-Managed Active Storage
One approach to high-performance processing of massive data sets is to incorporate computation into storage systems. Previous work has shown that this active storage model is effe...
Rajiv Wickremesinghe, Jeffrey S. Chase, Jeffrey Sc...
129
Voted
ISCA
2002
IEEE
95views Hardware» more  ISCA 2002»
15 years 10 months ago
An Instruction Set and Microarchitecture for Instruction Level Distributed Processing
An instruction set architecture (ISA) suitable for future microprocessor design constraints is proposed. The ISA has hierarchical register files with a small number of accumulator...
Ho-Seop Kim, James E. Smith
144
Voted
ISCC
2002
IEEE
111views Communications» more  ISCC 2002»
15 years 10 months ago
How to support Internet-based distribution of video on demand to portable devices
The increasing diffusion of mobile computing and of portable devices with wireless connectivity identifies new challenging scenarios for service provisioning. The access from devi...
Paolo Bellavista, Antonio Corradi
172
Voted
CDC
2009
IEEE
211views Control Systems» more  CDC 2009»
15 years 9 months ago
An event-triggered distributed primal-dual algorithm for Network Utility maximization
Abstract— Many problems associated with networked systems can be formulated as network utility maximization (NUM) problems. NUM problems maximize a global separable measure of ne...
Pu Wan, Michael D. Lemmon
138
Voted
RAID
2001
Springer
15 years 9 months ago
Autonomic Response to Distributed Denial of Service Attacks
ed Credential Chain Discovery in Trust Management - Extended Abstract............................... 35 N. Li, W. Winsborough, and J. Mitchell System Health and Intrusion Monitorin...
Daniel F. Sterne, Kelly Djahandari, Brett Wilson, ...