Sciweavers

42738 search results - page 8078 / 8548
» Search Computing Systems
Sort
View
IJHPCA
2007
116views more  IJHPCA 2007»
15 years 5 months ago
Pricing for Utility-Driven Resource Management and Allocation in Clusters
Users perceive varying levels of utility for each different job completed by the cluster. Therefore, there is a need for existing cluster Resource Management Systems (RMS) to prov...
Chee Shin Yeo, Rajkumar Buyya
156
Voted
SIMULATION
2008
139views more  SIMULATION 2008»
15 years 5 months ago
Constitutive Hybrid Processes: a Process-Algebraic Semantics for Hybrid Bond Graphs
Models of physical systems have to be based on physical principles such as conservation of energy and continuity of power. These principles are inherently enforced by the bond gra...
Pieter J. L. Cuijpers, Jan F. Broenink, Pieter J. ...
SMA
2008
ACM
396views Solid Modeling» more  SMA 2008»
15 years 5 months ago
Fast mesh segmentation using random walks
3D mesh models are now widely available for use in various applications. The demand for automatic model analysis and understanding is ever increasing. Mesh segmentation is an impo...
Yu-Kun Lai, Shi-Min Hu, Ralph R. Martin, Paul L. R...
IJNSEC
2007
126views more  IJNSEC 2007»
15 years 5 months ago
Elliptic Curve Cryptography Based Wireless Authentication Protocol
Recently, Aydos et al. proposed an ECC-based wireless authentication protocol. Because their protocol is based on ECC, the protocol has significant advantage including lower comp...
Yongliang Liu, Wen Gao, Hongxun Yao, Xinghua Yu
TCS
2008
15 years 5 months ago
Efficient corona training protocols for sensor networks
Phenomenal advances in nano-technology and packaging have made it possible to develop miniaturized low-power devices that integrate sensing, special-purpose computing, and wireles...
Alan A. Bertossi, Stephan Olariu, Maria Cristina P...
« Prev « First page 8078 / 8548 Last » Next »