Sciweavers

790 search results - page 48 / 158
» Limits of Work-Stealing Scheduling
Sort
View
106
Voted
IPPS
2003
IEEE
15 years 5 months ago
A P2P Approach for Global Computing
We describe a peer-to-peer self-organizing overlay network for our global computing system. The preliminary simulation results show that the network has some smallworld characteri...
Wen Dou, Yan Jia, Huaimin Wang, Wen Qiang Song, Pe...
WSC
1998
15 years 1 months ago
The Use of Simulation for Construction Elements Manufacturing
The manufacture of pre-cast concrete building elements consists of a few manufacturing steps. The process itself is simple, but the characteristics of the business are quite rando...
Katy Vern, Ali K. Gunal
SIGMETRICS
2008
ACM
118views Hardware» more  SIGMETRICS 2008»
15 years 14 days ago
Finding the optimal quantum size: Sensitivity analysis of the M/G/1 round-robin queue
We consider the round robin (RR) scheduling policy where the server processes each job in its buffer for at most a fixed quantum, q, in a round-robin fashion. The processor sharin...
Varun Gupta
CLUSTER
2010
IEEE
14 years 4 months ago
Middleware support for many-task computing
Many-task computing aims to bridge the gap between two computing paradigms, high throughput computing and high performance computing. Many-task computing denotes highperformance co...
Ioan Raicu, Ian T. Foster, Mike Wilde, Zhao Zhang,...
105
Voted
ATAL
2011
Springer
14 years 17 days ago
A double oracle algorithm for zero-sum security games on graphs
In response to the Mumbai attacks of 2008, the Mumbai police have started to schedule a limited number of inspection checkpoints on the road network throughout the city. Algorithm...
Manish Jain, Dmytro Korzhyk, Ondrej Vanek, Vincent...