Sciweavers

2497 search results - page 424 / 500
» Requirements for models of achievable routing
Sort
View
100
Voted
DSONLINE
2006
79views more  DSONLINE 2006»
15 years 1 months ago
Integrating Security Policies via Container Portable Interceptors
In the past, it was very common to develop middleware without consideration of security from the very beginning. To integrate security, the middleware that should be protected has...
Tom Ritter, Rudolf Schreiner, Ulrich Lang
83
Voted
CONCURRENCY
2007
103views more  CONCURRENCY 2007»
15 years 1 months ago
JaMP: an implementation of OpenMP for a Java DSM
In this paper we present JaMP, an adaptation of the OpenMP standard. JaMP is fitted to Jackal, a software-based DSM implementation for Java. While the set of supported directives...
Michael Klemm, Matthias Bezold, Ronald Veldema, Mi...
JPDC
2008
122views more  JPDC 2008»
15 years 1 months ago
Stochastic robustness metric and its use for static resource allocations
This research investigates the problem of robust static resource allocation for distributed computing systems operating under imposed Quality of Service (QoS) constraints. Often, ...
Vladimir Shestak, Jay Smith, Anthony A. Maciejewsk...
AMAI
2005
Springer
15 years 1 months ago
Auction design with costly preference elicitation
We consider auction design in a setting with costly preference elicitation. Well designed auctions can help to avoid unnecessary elicitation while determining efficient allocations...
David C. Parkes
TC
2008
15 years 1 months ago
A Geometric Transversal Approach to Analyzing Track Coverage in Sensor Networks
This paper presents a new coverage formulation addressing the quality of service of sensor networks that cooperatively detect targets traversing a region of interest. The problem o...
Kelli Baumgartner, Silvia Ferrari