Sciweavers

1040 search results - page 14 / 208
» Resource Usage Verification
Sort
View
CLUSTER
2003
IEEE
15 years 5 months ago
Improving Performance of a Dynamic Load Balancing System by Using Number of Effective Tasks
Efficient resource usage is a key to achieving better performance in cluster systems. Previously, most research in this area has focused on balancing the load of each node to use...
Min Choi, Jung-Lok Yu, Hojoong Kim, Seung Ryoul Ma...
ICCAD
1994
IEEE
105views Hardware» more  ICCAD 1994»
15 years 3 months ago
Register assignment through resource classification for ASIP microcode generation
Application Specific Instruction-Set Processors (ASIPs) offer designers the ability for high-speed data and control processing with the added flexibility needed for late design sp...
Clifford Liem, Trevor C. May, Pierre G. Paulin
CCGRID
2008
IEEE
15 years 1 months ago
Formal Verification of a Grid Resource Allocation Protocol
As the adoption of grid technology moves from science to industry, new requirements arise. In todays grid middlewares, the notion of paying for a job is a secondary requirement. In...
Mathias Dalheimer, Franz-Josef Pfreundt, Peter Mer...
OTM
2005
Springer
15 years 5 months ago
On the Usage of Global Document Occurrences in Peer-to-Peer Information Systems
There exist a number of approaches for query processing in Peer-to-Peer information systems that efficiently retrieve relevant information from distributed peers. However, very few...
Odysseas Papapetrou, Sebastian Michel, Matthias Be...
CSFW
2010
IEEE
15 years 3 months ago
Constraining Credential Usage in Logic-Based Access Control
—Authorization logics allow concise specification of flexible access-control policies, and are the basis for logic-based access-control systems. In such systems, resource owner...
Lujo Bauer, Limin Jia, Divya Sharma