Sciweavers

204 search results - page 25 / 41
» Evaluating the performance of the dNFSP file system
Sort
View
PE
2008
Springer
113views Optimization» more  PE 2008»
14 years 9 months ago
Joint uplink and downlink admission control to both streaming and elastic flows in CDMA/HSDPA systems
TCP-based data flows generate packets and ACKs in two directions, be it in the wireline or wireless networks. In the latter case, packets are typically found in the downlink where...
Tijani Chahed, Eitan Altman, Salah-Eddine Elayoubi
ICSM
2008
IEEE
15 years 3 months ago
Who can help me with this source code change?
An approach to recommend a ranked list of developers to assist in performing software changes to a particular file is presented. The ranking is based on change expertise, experien...
Huzefa H. Kagdi, Maen Hammad, Jonathan I. Maletic
NOSSDAV
2009
Springer
15 years 4 months ago
Power efficient real-time disk scheduling
Hard-disk drive power consumption reduction methods focus mainly on increasing the amount of time the disk is in standby mode (disk spun down) by implementing aggressive data read...
Damien Le Moal, Donald Molaro, Jorge Campello
AICCSA
2008
IEEE
291views Hardware» more  AICCSA 2008»
14 years 11 months ago
A dynamic weighted data replication strategy in data grids
Data grids deal with a huge amount of data regularly. It is a fundamental challenge to ensure efficient accesses to such widely distributed data sets. Creating replicas to a suita...
Ruay-Shiung Chang, Hui-Ping Chang, Yun-Ting Wang
JCS
2008
119views more  JCS 2008»
14 years 9 months ago
Synthesising verified access control systems through model checking
We present a framework for evaluating and generating access control policies. The framework contains a modelling formalism called RW, which is supported by a model checking tool. ...
Nan Zhang 0003, Mark Ryan, Dimitar P. Guelev