Sciweavers

530 search results - page 83 / 106
» The resource pooling principle
Sort
View
IPPS
2009
IEEE
15 years 8 months ago
Core-aware memory access scheduling schemes
Multi-core processors have changed the conventional hardware structure and require a rethinking of system scheduling and resource management to utilize them efficiently. However, ...
Zhibin Fang, Xian-He Sun, Yong Chen, Surendra Byna
CSFW
2008
IEEE
15 years 8 months ago
Evidence-Based Audit
Authorization logics provide a principled and flexible approach to specifying access control policies. One of their compelling benefits is that a proof in the logic is evidence ...
Jeffrey A. Vaughan, Limin Jia, Karl Mazurak, Steve...
103
Voted
ICC
2007
IEEE
100views Communications» more  ICC 2007»
15 years 8 months ago
Service Delivery in Collaborative Context-Aware Environments Using Fuzzy Logic
— This paper illustrates a novel decision making algorithm to deliver telecommunication services that match in the best possible way end-user’s requirements to current environm...
Raffaele Giaffreda, Javier A. Barria
CCS
2007
ACM
15 years 8 months ago
A data outsourcing architecture combining cryptography and access control
Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some of the most challe...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
GCC
2007
Springer
15 years 8 months ago
A Dynamic Quota-Based Peer Selection Strategy in BitTorrent
BitTorrent employs a static quota-based peer selection strategy to fixedly allocate upload quotas for the Tit-For-Tat (TFT) choke algorithm and Optimistic Unchoke (OU) algorithm, ...
Kun Huang, Lei Wang, Dafang Zhang, Yongwei Liu