• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 399
Next 10 →

Exploiting platform heterogeneity for power efficient data centers

by Ripal Nathuji - In Proceedings of the IEEE International Conference on Autonomic Computing (ICAC , 2007
"... It has recently become clear that power management is of critical importance in modern enterprise computing environments. The traditional drive for higher performance has influenced trends towards consolidation and higher densities, artifacts enabled by virtualization and new small form factor serve ..."
Abstract - Cited by 57 (4 self) - Add to MetaCart
fundamental characteristic of data centers: “platform heterogeneity”. This heterogeneity stems from the architectural and management-capability variations of the underlying platforms. We define an intelligent workload allocation method that leverages heterogeneity characteristics and efficiently maps

Adapting to Network and Client Variability via On-Demand Dynamic Distillation

by Armando Fox, Steven D. Gribble, Eric A. Brewer, Elan Amir , 1996
"... The explosive growth of the Internet and the proliferation of smart cellular phones and handheld wireless devices is widening an already large gap between Internet clients. Clients vary in their hardware resources, software sophistication, and quality of connectivity, yet server support for client v ..."
Abstract - Cited by 230 (11 self) - Add to MetaCart
three aspects of client variation by applying well-understood techniques in a novel way, resulting in quantitatively better end-to-end performance, higher quality display output, and new capabilities for lowend clients. 1

Modeling Context Information in Pervasive Compututing Systems

by Karen Henricksen, Jadwiga Indulska, Andry Rakotonirainy , 2002
"... As computing becomes more pervasive, the nature of applications must change accordingly.I n particular, applications must become more flexible in order to respond to highly dynamic computing environments, and more autonomous, to reflect the growing ratio of applications to users and the correspondin ..."
Abstract - Cited by 168 (14 self) - Add to MetaCart
and the corresponding decline in the attention a user can devote to each. That is, applications must become more context-aware. To facilitate the programming of such applications, infrastructure is required to gather, manage, and disseminate context information to applications. This paper is concerned

A PROPOSED VARIATION OF THE CAPABILITY MATURITY MODEL FRAMEWORK AMONG FINANCIAL MANAGEMENT SETTINGS

by D. Adrian Doss, Belhaven College, I Chun, Lisa Chen
"... This research investigates the perceived attributes of the Capability Maturity Model (CMM) process maturity framework within the context of financial management processes. An ANOVA analysis was conducted among financial management personnel to investigate hypothesis statements that reflected the bas ..."
Abstract - Add to MetaCart
This research investigates the perceived attributes of the Capability Maturity Model (CMM) process maturity framework within the context of financial management processes. An ANOVA analysis was conducted among financial management personnel to investigate hypothesis statements that reflected

Continuity and Transition in Corporate Capability: Incentives, Management, and Innovation at Dofasco, Inc.

by Gordon Boyce
"... Comparative analyses of innovation in the steel industry stress that the introduction of new technology into an environment is both an intraand inter-organizational phenomenon. Leonard Lynn examined how interaction between firms with diverse internal characteristics and environments which exhibited ..."
Abstract - Add to MetaCart
variations in the configuration of their constituents (suppliers, customers, research agencies, government, and competitors) influenced the rate at which the steel industries of Japan and the U.S. adopted a single technique, oxygen steelmaking (BOF) [12]. Roger Miller used a similar approach to compare

Revenue Maximization in ATM Networks Using the CLP Capability and Buffer Priority Management

by unknown authors
"... Abstract-The cell loss priority (CLP) bit in the header of the ATM cell may be used either by the network to tag noncompliant cells, or by the application to declare two levels of quality-of-service (QoS) within the same virtual circuit (VC). In this paper, we study the possibility of the use of thi ..."
Abstract - Add to MetaCart
= 1 traffic. To identify an operating point, we formulate a revenue optimization problem in which the constraints are the engineering trade-off curve and a simple model of the variation of CLP = 1 demand with its price. I.

Achieving sustainable new product development by integrating product life-cycle management capabilities

by Harald Gmelin , Stefan Seuring
"... a b s t r a c t Concerns about sustainability matters have been growing significantly during the last decades. The triple bottom line approach -an often applied operationalization of sustainability integrating the economic, social, and ecologic aspects of sustainable development -has gained attenti ..."
Abstract - Add to MetaCart
requirements increase complexity in new product development, in which globally-dispersed design teams, product variation, and time-to-market pressure already have to be managed. In order to mitigate these challenges in new product development, the incorporation of the three product life-cycle management

A receiver-centric transport protocol for mobile hosts with heterogeneous wireless interfaces

by Hung-yun Hsieh, Kyu-han Kim, Yujie Zhu, Raghupathy Sivakumar - In ACM Mobicom , 2003
"... Numerous transport protocols have been proposed in related work for use by mobile hosts over wireless environments. A common theme among the design of such protocols is that they specifically address the distinct characteristics of the last-hop wireless link, such as random wireless errors, round-tr ..."
Abstract - Cited by 81 (6 self) - Add to MetaCart
-trip time variations, blackouts, handoffs, etc. In this paper, we argue that due to the defining role played by the wireless link on a connection’s performance, locating the intelligence of a transport protocol at the mobile host that is adjacent to the wireless link can result in distinct performance

Energy-efficient and metastability-immune timing-error detection and instruction-replay-based recovery circuits for dynamic-variation tolerance

by Keith A. Bowman, James W. Tschanz, Nam Sung Kim, Janice C. Lee, Chris B. Wilkerson, Shih-lien L. Lu, Tanay Karnik, Senior Member, Vivek K. De, Senior Member - In Solid-State Circuits Conference, 2008. ISSCC 2008. Digest of Technical Papers. IEEE International , 2008
"... Abstract—A 65 nm resilient circuit test-chip is implemented with timing-error detection and recovery circuits to eliminate the clock frequency guardband from dynamic supply voltage and temperature variations as well as to exploit path-activation probabilities for maximizing throughput. Two error-de ..."
Abstract - Cited by 39 (0 self) - Add to MetaCart
Abstract—A 65 nm resilient circuit test-chip is implemented with timing-error detection and recovery circuits to eliminate the clock frequency guardband from dynamic supply voltage and temperature variations as well as to exploit path-activation probabilities for maximizing throughput. Two error

Journal of Logic and Algebraic Programming, 78:665 – 689. c○Elsevier, 2009. Dynamic management of capabilities in a network aware coordination language ✩

by Daniele Gorla A, Rosario Pugliese B
"... We introduce a capability-based access control model integrated into a linguistic formalism for modeling network aware systems and applications. Our access control model enables specification and dynamic modification of policies for controlling process activities (mobility of code and access to reso ..."
Abstract - Add to MetaCart
the model can be easily tailored for dealing with different forms of capability acquisition and loss, thus enabling different possible variations of access control policies.
Next 10 →
Results 1 - 10 of 399
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University