Sciweavers

1176 search results - page 134 / 236
» Exploiting Online Games
Sort
View
95
Voted
MM
2010
ACM
121views Multimedia» more  MM 2010»
15 years 26 days ago
Implementation and demonstration of a credit-based home access point
The increasing availability of high speed Internet access and the decreasing cost of wireless technologies has increased the number of devices in the home that wirelessly connect ...
Choong-Soo Lee, Mark Claypool, Robert E. Kinicki
150
Voted
SIGMOD
2011
ACM
193views Database» more  SIGMOD 2011»
14 years 3 months ago
Fast checkpoint recovery algorithms for frequently consistent applications
Advances in hardware have enabled many long-running applications to execute entirely in main memory. As a result, these applications have increasingly turned to database technique...
Tuan Cao, Marcos Antonio Vaz Salles, Benjamin Sowe...
133
Voted
PODC
2009
ACM
16 years 1 months ago
Load balancing without regret in the bulletin board model
We analyze the performance of protocols for load balancing in distributed systems based on no-regret algorithms from online learning theory. These protocols treat load balancing a...
Éva Tardos, Georgios Piliouras, Robert D. K...
CCGRID
2010
IEEE
15 years 1 months ago
The Effects of Untruthful Bids on User Utilities and Stability in Computing Markets
Markets of computing resources typically consist of a cluster (or a multi-cluster) and jobs that arrive over time and request computing resources in exchange for payment. In this p...
Sergei Shudler, Lior Amar, Amnon Barak, Ahuva Mu'a...
109
Voted
WWW
2008
ACM
16 years 1 months ago
R-U-in?: doing what you like, with people whom you like
This paper presents R-U-In? ? a social networking application that leverages Web 2.0 and IMS-based Converged Networks technologies to create a rich next-generation service. R-U-In...
Nilanjan Banerjee, Dipanjan Chakraborty, Koustuv D...