Sciweavers

944 search results - page 151 / 189
» SLA-based resource allocation in cluster computing systems
Sort
View
ESCIENCE
2005
IEEE
15 years 7 months ago
Identity-Based Cryptography for Grid Security
The majority of current security architectures for grid systems use public key infrastructure (PKI) to authenticate identities of grid members and to secure resource allocation to...
Hoon Wei Lim, Kenneth G. Paterson
ICDCS
2003
IEEE
15 years 7 months ago
Dynamic Module Replacement in Distributed Protocols
Dynamic module replacement — the ability to hot swap a component’s implementation at runtime — is fundamental to supporting evolutionary change in long-lived and highlyavail...
Nigamanth Sridhar, Scott M. Pike, Bruce W. Weide
101
Voted
ISORC
2003
IEEE
15 years 7 months ago
Basic Program Structures for Avoiding Priority Inversions
: Structuring real-time concurrent programs in the form of groups of fixed-priority processes is an old art which is appropriate for only a small fraction of modern real-time distr...
K. H. Kim
CORR
2010
Springer
198views Education» more  CORR 2010»
15 years 2 months ago
Space and the Synchronic A-Ram
Space is a spatial programming language designed to exploit the massive parallelism available in a formal model of computation called the Synchronic A-Ram, and physically related ...
Alexander Victor Berka
117
Voted
CEC
2010
IEEE
14 years 9 months ago
Multi-objective robust static mapping of independent tasks on grids
We study the problem of efficiently allocating incoming independent tasks onto the resources of a Grid system. Typically, it is assumed that the estimated time to compute each task...
Bernabé Dorronsoro Díaz, Pascal Bouv...