Match!
Cluster Computing
IF
1.85
Papers
3003
Papers 3391
1 page of 340 pages (3,391 results)
Newest
#1Félix García-Carballeira (Charles III University of Madrid)H-Index: 8
#2Alejandro Calderón (Charles III University of Madrid)H-Index: 10
Last. Jesus Carretero (Charles III University of Madrid)H-Index: 20
view all 3 authors...
This paper proposes a new version of the power of two choices, SQ(d), load balancing algorithm. This new algorithm improves the performance of the classical model based on the power of two choices randomized load balancing. This model considers jobs that arrive at a dispatcher as a Poisson stream of rate $\lambda n,$lambda < 1,$$ at a set of n servers. Using the power of two choices, the dispatcher chooses some d constant for each job independently and uniformly from the n servers in a rand...
Source
Source
Source
#2Yoonhee KimH-Index: 9
Last. Heon Y. YeomH-Index: 22
view all 3 authors...
The low capacity of main memory has become a critical issue in the performance of systems. Several memory schemes, utilizing multiple classes of memory devices, are used to mitigate the problem; hiding the small capacity by placing data in proper memory devices based on the hotness of the data. Memory tracers can provide such hotness information, but existing tracing tools incur extremely high overhead and the overhead increases as the problem size of a workload grows. In this paper, we propose ...
Source
Source
#2Hu PengH-Index: 2
Last. Zhijian WuH-Index: 15
view all 5 authors...
Source
Chronic patients are adapting to an emerging healthcare system assisted by the wireless body area network (WBAN). Medical data are not normal at all times; hence, the preference for critical data is expected to be high, and the requirement of security has become essential. This paper addresses a novel healthcare monitoring system (HMS) that adopts the IEEE 802.15.6 standard for WBAN. A modified IEEE 802.15.6 MAC is designed for predicting data types and residual energy on body sensors. An enhanc...
Source
Source
#1Yazi WangH-Index: 1
#2Yingbo LiangH-Index: 1
view all 4 authors...
Traditional network intrusion detection algorithm is based on pattern matching, which has made great progress in network intrusion detection system, but the efficiency of this algorithm for data packet matching is quite low. With the rapid increase of Internet scale and capacity, the general information security problem appears, and it brought hidden danger for an open network security. In this paper, the author analyse the intrusion detection and performance simulation based on improved sequent...
Source
#1Ahed AbugabahH-Index: 6
#2Ahmad Ali AlZubiH-Index: 2
Last. Ayed AlwadainH-Index: 6
view all 5 authors...
Source
12345678910
Top fields of study
Distributed computing
Computer network
Computer science
Real-time computing
Cloud computing