Sciweavers

9095 search results - page 1712 / 1819
» Service RT Systems
Sort
View
LCN
2000
IEEE
15 years 8 months ago
Performance Impact of Data Compression on Virtual Private Network Transactions
Virtual private networks (VPNs) allow two or more parties to communicate securely over a public network. Using cryptographic algorithms and protocols, VPNs provide security servic...
John Patrick McGregor, Ruby B. Lee
135
Voted
RTSS
2000
IEEE
15 years 8 months ago
A User-Customizable Energy-Adaptive Combined Static/Dynamic Scheduler for Mobile Applications
In portable applications, the energy consumed by OS and application tasks primarily comes from DC battery source, which is limited and imposes an upper bound to the amount of time...
Trolan C. L. Ma, Kang G. Shin
152
Voted
CAISE
2000
Springer
15 years 8 months ago
Design Principles for Application Integration
Application integration is a major trend in information technology today. In this paper we present a number of principles for the design, validation and presentation of process mod...
Paul Johannesson, Erik Perjons
HPDC
1999
IEEE
15 years 8 months ago
Process Hijacking
Process checkpointing is a basic mechanism required for providing High Throughput Computing service on distributively owned resources. We present a new process checkpoint and migr...
Victor C. Zandy, Barton P. Miller, Miron Livny
RTSS
1999
IEEE
15 years 8 months ago
A Scalable Solution to the Multi-Resource QoS Problem
The problem of maximizing system utility by allocating a single finite resource to satisfy discrete Quality of Service (QoS) requirements of multiple applications along multiple Q...
Chen Lee, John P. Lehoczky, Daniel P. Siewiorek, R...
« Prev « First page 1712 / 1819 Last » Next »