Sciweavers

790 search results - page 123 / 158
» Limits of Work-Stealing Scheduling
Sort
View
97
Voted
HPDC
2002
IEEE
15 years 5 months ago
A Decentralized, Adaptive Replica Location Mechanism
We describe a decentralized, adaptive mechanism for replica location in wide-area distributed systems. Unlike traditional, hierarchical (e.g, DNS) and more recent (e.g., CAN, Chor...
Matei Ripeanu, Ian T. Foster
ICDCS
2002
IEEE
15 years 5 months ago
Process Migration: A Generalized Approach Using a Virtualizing Operating System
Process migration has been used to perform specialized tasks, such as load sharing and checkpoint/restarting long running applications. Implementation typically consists of modifi...
Tom Boyd, Partha Dasgupta
125
Voted
IDEAS
2002
IEEE
223views Database» more  IDEAS 2002»
15 years 5 months ago
Energy-Efficient Data Broadcasting in Mobile Ad-Hoc Networks
Energy saving is the most important issue in wireless mobile computing due to power constraints on mobile units. Data broadcasting is the main method of information dissemination ...
Le Gruenwald, Muhammad Javed, Meng Gu
105
Voted
INFOCOM
2002
IEEE
15 years 5 months ago
Improving the Performance of Interactive TCP Applications using Service Differentiation
Abstract—Interactive TCP applications, such as Telnet and the Web, are particularly sensitive to network congestion. Indeed, congestion-induced queuing and packet loss can be a s...
Waël Noureddine, Fouad A. Tobagi
106
Voted
RTSS
2002
IEEE
15 years 5 months ago
A Fast Resource Synthesis Technique for Energy-Efficient Real-Time System
We consider a resource synthesis technique for realtime systems where the energy budget is limited and the performance of the system depends on how resources and energy are used. ...
Dong-In Kang, Stephen P. Crago, Jinwoo Suh