Sciweavers

664 search results - page 125 / 133
» Solution to the Counterfeit Coin Problem and its Generalizat...
Sort
View
I3
2007
14 years 11 months ago
Identity: How to name it, How to find it
The main objective of this work is to exploit the relationship between the information findability problem and a subject-based organization of information. Identification of a sub...
Christo Dichev, Darina Dicheva, Jan Fischer
APCCM
2009
14 years 10 months ago
Conceptual Application Domain Modelling
Application domain description precedes requirements engineering, and is the basis for the development of a software or information system that satisfies all expectations of its u...
Bernhard Thalheim, Klaus-Dieter Schewe, Hui Ma
SIGCOMM
2010
ACM
14 years 9 months ago
Topology-aware resource allocation for data-intensive workloads
This paper proposes an architecture for optimized resource allocation in Infrastructure-as-a-Service (IaaS)-based cloud systems. Current IaaS systems are usually unaware of the ho...
Gunho Lee, Niraj Tolia, Parthasarathy Ranganathan,...
SIGMETRICS
2008
ACM
138views Hardware» more  SIGMETRICS 2008»
14 years 9 months ago
Utility maximization in peer-to-peer systems
In this paper, we study the problem of utility maximization in P2P systems, in which aggregate application-specific utilities are maximized by running distributed algorithms on P2...
Minghua Chen, Miroslav Ponec, Sudipta Sengupta, Ji...
WWW
2002
ACM
15 years 10 months ago
A web-based resource migration protocol using WebDAV
The web's hyperlinks are notoriously brittle, and break whenever a resource migrates. One solution to this problem is a transparent resource migration mechanism, which separa...
Michael P. Evans, Steven Furnell