Sciweavers

1040 search results - page 36 / 208
» Resource Usage Verification
Sort
View
VRST
2000
ACM
15 years 2 months ago
Message caching for local and global resource optimization in shared virtual environments
The use of Shared Virtual Environments is growing in areas such as multi-player video games, military and industrial training, and collaborative design and engineering. At the sam...
Helmuth Trefftz, Ivan Marsic
WSC
2001
14 years 11 months ago
Resource graphs for modeling large-scale, highly congested systems
Simulations often execute too slowly to be effective tools for decision-making. In particular, this problem has been found in semiconductor manufacturing where conventional job-dr...
Paul Hyden, Lee Schruben, Theresa M. Roeder
IJIPT
2007
78views more  IJIPT 2007»
14 years 9 months ago
If objects could talk: a novel resource discovery approach for pervasive environments
: We propose to extend standard Radio Frequency IDentification (RFID) usage by storing semantically annotated data within RFID tags memory, so that objects may actually ‘describ...
Michele Ruta, Tommaso Di Noia, Eugenio Di Sciascio...
CN
2000
96views more  CN 2000»
14 years 9 months ago
Dynamic routing and resource allocation in WDM transport networks
This contribution concentrates on dynamic routing in WDM (Wavelength Division Multiplexing) networks. It is shown that a strategy based on precalculated alternatives and an adapti...
Jan Späth
SEC
2008
14 years 11 months ago
Role Signatures for Access Control in Open Distributed Systems
Implementing access control efficiently and effectively in an open and distributed system is a challenging problem. One reason for this is that users requesting access to remote re...
Jason Crampton, Hoon Wei Lim