Sciweavers

2674 search results - page 16 / 535
» On architecture transparency in operating systems
Sort
View
CN
2002
96views more  CN 2002»
14 years 9 months ago
A transparent deployment method of RSVP-aware applications on UNIX
This paper proposes a method, called RLR (RSVP (Resource reSerVation Protocol) library redirection), which can transform legacy Internet applications into RSVP-aware applications ...
Yu-Ben Miao, Wen-Shyang Hwang, Ce-Kuen Shieh
77
Voted
HAPTICS
2010
IEEE
15 years 2 months ago
Transparency of the Generalized Scattering Transformation for Haptic Telepresence
In this paper we analyze the transparency of the generalized scattering transformation applied to teleoperation systems with constant time delay. Particularly, the human operator, ...
Iason Vittorias, Sandra Hirche
ICDCN
2012
Springer
13 years 5 months ago
Lifting the Barriers - Reducing Latencies with Transparent Transactional Memory
Synchronization in distributed systems is expensive because, in general, threads must stall to obtain a lock or to operate on volatile data. Transactional memory, on the other hand...
Annette Bieniusa, Thomas Fuhrmann
OSDI
2004
ACM
15 years 10 months ago
Middleboxes No Longer Considered Harmful
Intermediate network elements, such as network address translators (NATs), firewalls, and transparent caches are now commonplace. The usual reaction in the network architecture co...
Michael Walfish, Jeremy Stribling, Maxwell N. Kroh...
LCTRTS
2010
Springer
15 years 4 months ago
Elastic computing: a framework for transparent, portable, and adaptive multi-core heterogeneous computing
Over the past decade, system architectures have started on a clear trend towards increased parallelism and heterogeneity, often resulting in speedups of 10x to 100x. Despite numer...
John Robert Wernsing, Greg Stitt