Sciweavers

790 search results - page 42 / 158
» Limits of Work-Stealing Scheduling
Sort
View
CORR
2007
Springer
93views Education» more  CORR 2007»
15 years 16 days ago
Opportunistic Scheduling and Beamforming for MIMO-SDMA Downlink Systems with Linear Combining
Opportunistic scheduling and beamforming schemes are proposed for multiuser MIMO-SDMA downlink systems with linear combining in this work. Signals received from all antennas of ea...
Man-On Pun, Visa Koivunen, H. Vincent Poor
ICDE
2005
IEEE
260views Database» more  ICDE 2005»
16 years 1 months ago
A Comparative Evaluation of Transparent Scaling Techniques for Dynamic Content Servers
We study several transparent techniques for scaling dynamic content web sites, and we evaluate their relative impact when used in combination. Full transparency implies strong dat...
Cristiana Amza, Alan L. Cox, Willy Zwaenepoel
110
Voted
MDM
2009
Springer
138views Communications» more  MDM 2009»
15 years 7 months ago
SLA-Aware Adaptive On-demand Data Broadcasting in Wireless Environments
—In mobile and wireless networks, data broadcasting for popular data items enables the efficient utilization of the limited wireless bandwidth. However, efficient data scheduli...
Adrian Daniel Popescu, Mohamed A. Sharaf, Cristian...
118
Voted
SP
2008
IEEE
117views Security Privacy» more  SP 2008»
15 years 7 months ago
Anonymous Networking with Minimum Latency in Multihop Networks
The problem of security against timing based traffic analysis in multihop networks is considered in this work. In particular, the relationship between the level of anonymity prov...
Parvathinathan Venkitasubramaniam, Lang Tong
87
Voted
CCGRID
2006
IEEE
15 years 6 months ago
Simple Locality-Aware Co-allocation in Peer-to-Peer Supercomputing
With current grid middleware, it is difficult to deploy distributed supercomputing applications that run concurrently on multiple resources. As current grid middleware systems ha...
Niels Drost, Rob van Nieuwpoort, Henri E. Bal