Sciweavers

1176 search results - page 134 / 236
» Exploiting Online Games
Sort
View
77
Voted
MM
2010
ACM
121views Multimedia» more  MM 2010»
14 years 11 months ago
Implementation and demonstration of a credit-based home access point
The increasing availability of high speed Internet access and the decreasing cost of wireless technologies has increased the number of devices in the home that wirelessly connect ...
Choong-Soo Lee, Mark Claypool, Robert E. Kinicki
127
Voted
SIGMOD
2011
ACM
193views Database» more  SIGMOD 2011»
14 years 1 months ago
Fast checkpoint recovery algorithms for frequently consistent applications
Advances in hardware have enabled many long-running applications to execute entirely in main memory. As a result, these applications have increasingly turned to database technique...
Tuan Cao, Marcos Antonio Vaz Salles, Benjamin Sowe...
PODC
2009
ACM
15 years 11 months ago
Load balancing without regret in the bulletin board model
We analyze the performance of protocols for load balancing in distributed systems based on no-regret algorithms from online learning theory. These protocols treat load balancing a...
Éva Tardos, Georgios Piliouras, Robert D. K...
86
Voted
CCGRID
2010
IEEE
15 years 1 days ago
The Effects of Untruthful Bids on User Utilities and Stability in Computing Markets
Markets of computing resources typically consist of a cluster (or a multi-cluster) and jobs that arrive over time and request computing resources in exchange for payment. In this p...
Sergei Shudler, Lior Amar, Amnon Barak, Ahuva Mu'a...
WWW
2008
ACM
15 years 11 months ago
R-U-in?: doing what you like, with people whom you like
This paper presents R-U-In? ? a social networking application that leverages Web 2.0 and IMS-based Converged Networks technologies to create a rich next-generation service. R-U-In...
Nilanjan Banerjee, Dipanjan Chakraborty, Koustuv D...