Sciweavers

790 search results - page 90 / 158
» Limits of Work-Stealing Scheduling
Sort
View
CIDR
2009
155views Algorithms» more  CIDR 2009»
15 years 1 months ago
LifeRaft: Data-Driven, Batch Processing for the Exploration of Scientific Databases
Workloads that comb through vast amounts of data are gaining importance in the sciences. These workloads consist of "needle in a haystack" queries that are long running ...
Xiaodan Wang, Randal C. Burns, Tanu Malik
GRID
2008
Springer
15 years 20 days ago
Market-oriented Grids and Utility Computing: The State-of-the-art and Future Directions
Traditional resource management techniques (resource allocation, admission control and scheduling) have been found to be inadequate for many shared Grid and distributed systems th...
James Broberg, Srikumar Venugopal, Rajkumar Buyya
114
Voted
AUTOMATICA
1999
78views more  AUTOMATICA 1999»
15 years 9 days ago
On the speedup required for combined input- and output-queued switching
Architectures based on a non-blocking fabric, such as a crosspoint switch, are attractive for use in high-speed LAN switches, IP routers, and ATM switches. These fabrics, coupled ...
Balaji Prabhakar, Nick McKeown
109
Voted
IWDC
2001
Springer
101views Communications» more  IWDC 2001»
15 years 5 months ago
Resource Stealing in Endpoint Controlled Multi-class Networks
Abstract. Endpoint admission control is a mechanism for achieving scalable services by pushing quality-of-service functionality to end hosts. In particular, hosts probe the network...
Susana Sargento, Rui Valadas, Edward W. Knightly
AIPS
2007
15 years 3 months ago
Temporally-Expressive Planning as Constraint Satisfaction Problems
Due to its important practical applications, temporal planning is of great research interest in artificial intelligence. Yet most of the work in this area so far is limited in at...
Yuxiao Hu