Sciweavers

1054 search results - page 168 / 211
» From a Verified Kernel towards Verified Systems
Sort
View
JSSPP
2009
Springer
15 years 8 months ago
Competitive Two-Level Adaptive Scheduling Using Resource Augmentation
Abstract. As multi-core processors proliferate, it has become more important than ever to ensure efficient execution of parallel jobs on multiprocessor systems. In this paper, we s...
Hongyang Sun, Yangjie Cao, Wen-Jing Hsu
HICSS
2008
IEEE
165views Biometrics» more  HICSS 2008»
15 years 8 months ago
Can a P2P File-Sharing Network Become an e-Marketplace?
The prevalence of P2P technology contributes the ease of file-sharing, but it also brings some problems such as free-riding and copyright infringement. To solve these problems, ma...
Fu-ren Lin, Hau-ming Lo, Cong-ren Wang
ICEBE
2007
IEEE
79views Business» more  ICEBE 2007»
15 years 8 months ago
Partition-based Profit Optimisation for Multi-class Requests in Clusters of Servers
This paper investigates profit optimisation by the partitioning of server pools. Different types of web requests are considered in this paper: best-effort requests and multi-class...
Ligang He, James Wen Jun Xue, Stephen A. Jarvis
CC
2007
Springer
109views System Software» more  CC 2007»
15 years 8 months ago
Layout Transformations for Heap Objects Using Static Access Patterns
As the amount of data used by programs increases due to the growth of hardware storage capacity and computing power, efficient memory usage becomes a key factor for performance. Si...
Jinseong Jeon, Keoncheol Shin, Hwansoo Han
CCS
2007
ACM
15 years 8 months ago
Split-ballot voting: everlasting privacy with distributed trust
In this paper we propose a new voting protocol with desirable security properties. The voting stage of the protocol can be performed by humans without computers; it provides every...
Tal Moran, Moni Naor