Sciweavers

1040 search results - page 144 / 208
» Resource Usage Verification
Sort
View
TES
2001
Springer
15 years 7 months ago
Security for Distributed E-Service Composition
Current developments show that tomorrow’s information systems and applications will no longer be based on monolithic architectures that encompass all the functionality. Rather, t...
Stefan Seltzsam, Stephan Börzsönyi, Alfo...
CLUSTER
2004
IEEE
15 years 7 months ago
Cluster computing environment supporting single system image
Single system image(SSI) systems have been the mainstay of high-performance computing for many years. SSI requires the integration and aggregation of all types of resources in a c...
Min Choi, DaeWoo Lee, Seung Ryoul Maeng
EEE
2004
IEEE
15 years 7 months ago
The Design of QoS Broker Algorithms for QoS-Capable Web Services
QoS (Quality of Service) support in Web services is an important issue since it ensures service usability and utility for each client and, in addition, improves server utilization...
Tao Yu, Kwei-Jay Lin
PUK
2000
15 years 4 months ago
Scheduling in a Planning Environment
In a real planning problem, there exists a set of constraints (both temporal constraints and resource usage constraints) which must be satisfied in order to obtain a feasible plan....
Antonio Garrido Tejero, Miguel A. Salido, Federico...
JSAC
2008
161views more  JSAC 2008»
15 years 3 months ago
HC-MAC: A Hardware-Constrained Cognitive MAC for Efficient Spectrum Management
Abstract--Radio spectrum resource is of fundamental importance for wireless communication. Recent reports show that most available spectrum has been allocated. While some of the sp...
Juncheng Jia, Qian Zhang, Xuemin Shen