Sciweavers

1040 search results - page 47 / 208
» Resource Usage Verification
Sort
View
INFOCOM
2005
IEEE
15 years 7 months ago
A fair resource allocation algorithm for peer-to-peer overlays
— Over the past few years, Peer-to-Peer (P2P) systems have become very popular for constructing overlay networks of many nodes (peers) that allow users geographically distributed...
Yannis Drougas, Vana Kalogeraki
FLAIRS
2001
15 years 3 months ago
Learning and Predicting User Behavior for Particular Resource Use
To successfully interact with users in providing useful information, intelligent user interfaces need a mechanism for recognizing, characterizing, and predicting user actions. In ...
Jung Jin Lee, Robert McCartney, Eugene Santos Jr.
JVCIR
2008
110views more  JVCIR 2008»
15 years 1 months ago
Video quality and system resources: Scheduling two opponents
In this article we present three key ideas which together form a flexible framework for maximizing user-perceived quality under given resources with modern video codecs (H.264). F...
Michael Roitzsch, Martin Pohlack
ISSRE
2008
IEEE
15 years 8 months ago
Detection and Prediction of Resource-Exhaustion Vulnerabilities
Systems connected to the Internet are highly susceptible to denial-of-service attacks that can compromise service availability, causing damage to customers and providers. Due to e...
João Antunes, Nuno Ferreira Neves, Paulo Ve...
SC
2005
ACM
15 years 7 months ago
DI-GRUBER: A Distributed Approach to Grid Resource Brokering
Managing usage service level agreements (USLAs) within environments that integrate participants and resources spanning multiple physical institutions is a challenging problem. Mai...
Catalin Dumitrescu, Ioan Raicu, Ian T. Foster