In peer-to-peer storage systems, peers can freely join and leave the system at any time. Ensuring high data availability in such an environment is a challenging task. In this paper...
The recent emergence of mandatory access (MAC) enforcement for virtual machine monitors (VMMs) presents an opportunity to enforce a security goal over all its virtual machines (VM...
—With increasing spatial reuse of the radio spectrum, co-channel interference is becoming the dominant noise source and may severely degrade the communication performance of wire...
Kapil Gulati, Aditya Chopra, Brian L. Evans, Keith...
Given that contractor plays a critical role in any construction project, contractor selection constitutes key decision for public authorities. Prequalification, i.e. the eliminati...
This paper presents an analytical model to predict the performance of general-purpose applications on a GPU architecture. The model is designed to provide performance information ...
Sara S. Baghsorkhi, Matthieu Delahaye, Sanjay J. P...