Sciweavers

4118 search results - page 748 / 824
» Mechanisms for usage control
Sort
View
VEE
2012
ACM
218views Virtualization» more  VEE 2012»
13 years 7 months ago
Enhancing TCP throughput of highly available virtual machines via speculative communication
Checkpoint-recovery based virtual machine (VM) replication is an attractive technique for accommodating VM installations with high-availability. It provides seamless failover for ...
Balazs Gerofi, Yutaka Ishikawa
CHI
2009
ACM
16 years 14 days ago
The mousegrip
Computer games, often played with others, are a compelling pastime for many. However, they have been criticized for their mouse and keyboard or gamepad interactions, as they suppo...
Florian Mueller, Martin R. Gibbs, Frank Vetere
HPCA
2008
IEEE
16 years 7 days ago
System level analysis of fast, per-core DVFS using on-chip switching regulators
Portable, embedded systems place ever-increasing demands on high-performance, low-power microprocessor design. Dynamic voltage and frequency scaling (DVFS) is a well-known techniq...
Wonyoung Kim, Meeta Sharma Gupta, Gu-Yeon Wei, Dav...
STOC
2007
ACM
101views Algorithms» more  STOC 2007»
16 years 6 days ago
The price of privacy and the limits of LP decoding
This work is at the intersection of two lines of research. One line, initiated by Dinur and Nissim, investigates the price, in accuracy, of protecting privacy in a statistical dat...
Cynthia Dwork, Frank McSherry, Kunal Talwar
OSDI
2002
ACM
16 years 5 days ago
Resource Overbooking and Application Profiling in Shared Hosting Platforms
In this paper, we present techniques for provisioning CPU and network resources in shared hosting platforms running potentially antagonistic third-party applications. The primary ...
Bhuvan Urgaonkar, Prashant J. Shenoy, Timothy Rosc...