Sciweavers

1040 search results - page 66 / 208
» Resource Usage Verification
Sort
View
PDPTA
2004
14 years 11 months ago
Evaluation of a Job Admission Algorithm for Bandwidth Constrained Grids
Abstract One of the goals envisioned by Grid computing is to make the execution of both computational and data-intensive problems possible. A key problem is finding the optimal set...
Marc De Leenheer, Pieter Thysebaert, Bruno Volckae...
RTSS
2005
IEEE
15 years 3 months ago
Improving Soft Real-Time Performance through Better Slack Reclaiming
Modern operating systems frequently support applications with a variety of timing constraints including hard real-time, soft real-time, and best-effort. To guarantee performance, ...
Caixue Lin, Scott A. Brandt
GECON
2008
Springer
134views Business» more  GECON 2008»
14 years 11 months ago
Rational Bidding Using Reinforcement Learning
The application of autonomous agents by the provisioning and usage of computational resources is an attractive research field. Various methods and technologies in the area of arti...
Nikolay Borissov, Arun Anandasivam, Niklas Wirstr&...
JNW
2008
122views more  JNW 2008»
14 years 9 months ago
A Comprehensive Experimental Comparison of Event Driven and Multi-Threaded Sensor Node Operating Systems
The capabilities of a sensor network are strongly influenced by the operating system used on the sensor nodes. In general, two different sensor network operating system types are c...
Cormac Duffy, Utz Roedig, John Herbert, Cormac J. ...
CSE
2009
IEEE
15 years 1 months ago
Information Technology Capabilities for Digital Social Networks
This paper contributes to the evolving body of knowledge pertaining to the study of digitally-enabled social networks, their usage, and their effects on people, organization, and s...
Camille Grange, Izak Benbasat