• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,399
Next 10 →

The eucalyptus open-source cloud-computing system

by Daniel Nurmi, Rich Wolski, Chris Grzegorczyk, Graziano Obertelli, Sunil Soman, Lamia Youseff, Dmitrii Zagorodnov - In Proceedings of Cloud Computing and Its Applications [Online
"... Cloud computing systems fundamentally provide access to large pools of data and computational resources through a variety of interfaces similar in spirit to existing grid and HPC resource management and programming systems. These types of systems offer a new programming target for scalable applicati ..."
Abstract - Cited by 415 (9 self) - Add to MetaCart
. In this work, we present EUCALYPTUS – an opensource software framework for cloud computing that implements what is commonly referred to as Infrastructure as a Service (IaaS); systems that give users the ability to run and control entire virtual machine instances deployed across a variety physical resources. We

Middleware specialization for memory-constrained networked embedded systems

by Venkita Subramonian, Huang-ming Huang, Guoliang Xing, Christopher Gill, Chenyang Lu, Ron Cytron - in 9th IEEE Real-Time and Embedded Technology and Applications Symposium , 2004
"... General purpose middleware has been shown to be effective off-the-shelf, in meeting diverse functional requirements for a wide range of distributed systems. However, middleware customization is necessary for many networked embedded systems because of the resource constraints in the networked nodes. ..."
Abstract - Cited by 30 (19 self) - Add to MetaCart
General purpose middleware has been shown to be effective off-the-shelf, in meeting diverse functional requirements for a wide range of distributed systems. However, middleware customization is necessary for many networked embedded systems because of the resource constraints in the networked nodes

The AppLeS parameter sweep template: User-level middleware for the grid

by Henri Casanova , Graziano Obertelli , Francine Berman , Richard Wolski - In SC00 Conference on High-Performance Computing , 2000
"... The Computational Grid is a promising platform for the efficient execution of parameter sweep applications over large parameter spaces. To achieve performance on the Grid, such applications must be scheduled so that shared data files are strategically placed to maximize re-use, and so that the appl ..."
Abstract - Cited by 240 (30 self) - Add to MetaCart
and targets Grid resources transparently. In this paper we describe a user-level Grid middleware project, the AppLeS Parameter Sweep Template (APST), that uses application-level scheduling techniques [1] and various Grid technologies to allow the efficient deployment of parameter sweep applications over

The Bits and Flops of the N-hop Multilateration Primitive For Node Localization Problems

by Andreas Savvides, Heemin Park, Mani B. Srivastava , 2002
"... The recent advances in MEMS, embedded systems and wireless communication technologies are making the realization and deployment of networked wireless microsensors a tangible task. Vital to the success of wireless microsensor networks is the ability of microsensors to "collectively perform sensi ..."
Abstract - Cited by 280 (2 self) - Add to MetaCart
The recent advances in MEMS, embedded systems and wireless communication technologies are making the realization and deployment of networked wireless microsensors a tangible task. Vital to the success of wireless microsensor networks is the ability of microsensors to "collectively perform

Emstar: a software environment for developing and deploying wireless sensor networks

by Lewis Girod, Jeremy Elson, Thanos Stathopoulos, Martin Lukac, Deborah Estrin - In Proceedings of the 2004 USENIX Technical Conference , 2004
"... Recent work in wireless embedded networked systems has followed heterogeneous designs, incorporating a mixture of elements from extremely constrained 8- or 16-bit “Motes ” to less resourceconstrained 32-bit embedded “Microservers.” Emstar is a software environment for developing and deploying comple ..."
Abstract - Cited by 194 (26 self) - Add to MetaCart
Recent work in wireless embedded networked systems has followed heterogeneous designs, incorporating a mixture of elements from extremely constrained 8- or 16-bit “Motes ” to less resourceconstrained 32-bit embedded “Microservers.” Emstar is a software environment for developing and deploying

Middleware Specialization for Memory-Constrained Networked Embedded

by Venkita Subramonian Guoliang, Guoliang Xing, Christopher Gill, Chenyang Lu, Ron Cytron - in 9th IEEE Real-Time and Embedded Technology and Applications Symposium , 2004
"... General purpose middleware has been shown to be effective off-the-shelf, in meeting diverse functional requirements for a wide range of distributed systems. However, middleware customization is necessary for many networked embedded systems because of the resource constraints in the networked nodes. ..."
Abstract - Add to MetaCart
General purpose middleware has been shown to be effective off-the-shelf, in meeting diverse functional requirements for a wide range of distributed systems. However, middleware customization is necessary for many networked embedded systems because of the resource constraints in the networked nodes

A Style-Aware Architectural Middleware for Resource-Constrained, Distributed Systems

by Sam Malek, Marija Mikic-Rakic, Nenad Medvidovic - IEEE Trans. on Software Engineering , 2005
"... A recent emergence of small, resource-constrained, and highly mobile computing platforms presents numerous new challenges for software developers. We refer to development in this new setting as programming-in-the-small-and-many (Prism). This paper provides a description and evaluation of Prism-MW, ..."
Abstract - Cited by 52 (31 self) - Add to MetaCart
industrial organization for use in one of their key distributed embedded systems. Our experience with the middleware indicates that the principles of architecture-based software development can be successfully, and flexibly, applied in the Prism setting.

A line in the sand: a wireless sensor network for target detection, classification, and tracking

by A. Arora , P. Dutta , S. Bapat , V. Kulathumani , H. Zhang , V. Naik, V. Mittal , H. Cao , M. Demirbas , M. Gouda , Y. Choi , T. Herman , et al. - COMPUTER NETWORKS , 2004
"... Intrusion detection is a surveillance problem of practical import that is well suited to wireless sensor networks. In this paper, we study the application of sensor networks to the intrusion detection problem and the related problems of classifying and tracking targets. Our approach is based on a de ..."
Abstract - Cited by 272 (41 self) - Add to MetaCart
dense, distributed, wireless network of multi-modal resource-poor sensors combined into loosely coherent sensor arrays that perform in situ detection, estimation, compression, and exfiltration. We ground our study in the context of a security scenario called ‘‘A Line in the Sand’ ’ and accordingly

Middleware Support for Resource-Constrained Software Deployment

by Nicolas Le Sommer, Frédéric Guidec , 2008
"... Abstract The JAMUS platform is dedicated to providing a safe runtime environment for untrusted Java application programs, while offering each of these programs access to the resources it needs to use at runtime. To achieve this goal, JAMUS implements a contractual approach of resource utilisation an ..."
Abstract - Add to MetaCart
and control, together with a reservation-based resource management scheme, and a monitoring model. When getting deployed on the platform, a candidate program must first subscribe a contract with the resource manager of the platform. This contract describes the resources the program requires to be able

Power Efficient Organization of Wireless Sensor Networks

by Sasa Slijepcevic, Miodrag Potkonjak , 2001
"... Abstract-- Wireless sensor networks have emerged recently as an effective way of monitoring remote or inhospitable physical environments. One of the major challenges in devising such networks lies in the constrained energy and computational resources available to sensor nodes. These constraints must ..."
Abstract - Cited by 261 (7 self) - Add to MetaCart
Abstract-- Wireless sensor networks have emerged recently as an effective way of monitoring remote or inhospitable physical environments. One of the major challenges in devising such networks lies in the constrained energy and computational resources available to sensor nodes. These constraints
Next 10 →
Results 1 - 10 of 1,399
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University