Sciweavers

1040 search results - page 47 / 208
» Resource Usage Verification
Sort
View
INFOCOM
2005
IEEE
15 years 3 months ago
A fair resource allocation algorithm for peer-to-peer overlays
— Over the past few years, Peer-to-Peer (P2P) systems have become very popular for constructing overlay networks of many nodes (peers) that allow users geographically distributed...
Yannis Drougas, Vana Kalogeraki
FLAIRS
2001
14 years 11 months ago
Learning and Predicting User Behavior for Particular Resource Use
To successfully interact with users in providing useful information, intelligent user interfaces need a mechanism for recognizing, characterizing, and predicting user actions. In ...
Jung Jin Lee, Robert McCartney, Eugene Santos Jr.
JVCIR
2008
110views more  JVCIR 2008»
14 years 9 months ago
Video quality and system resources: Scheduling two opponents
In this article we present three key ideas which together form a flexible framework for maximizing user-perceived quality under given resources with modern video codecs (H.264). F...
Michael Roitzsch, Martin Pohlack
ISSRE
2008
IEEE
15 years 4 months ago
Detection and Prediction of Resource-Exhaustion Vulnerabilities
Systems connected to the Internet are highly susceptible to denial-of-service attacks that can compromise service availability, causing damage to customers and providers. Due to e...
João Antunes, Nuno Ferreira Neves, Paulo Ve...
SC
2005
ACM
15 years 3 months ago
DI-GRUBER: A Distributed Approach to Grid Resource Brokering
Managing usage service level agreements (USLAs) within environments that integrate participants and resources spanning multiple physical institutions is a challenging problem. Mai...
Catalin Dumitrescu, Ioan Raicu, Ian T. Foster