نتایج جستجو برای: resource usage

تعداد نتایج: 301794  

2002
Aloysius K. Mok Weijiang Yu

Resource security pertains to the prevention of unauthorized usage of system resources that may not directly cause corruption or leakage of information. A common breach of resource security is the class of attacks called DoS (Denial of Service) attacks. This paper proposes an architecture called TINMAN whose goal is to efficiently and effectively safeguard resource security for mobile source co...

2006
Edwin Brady Kevin Hammond James McKinna

This paper studies the problem of constructing formal bounds on program resource usage and other complex properties. We use fullspectrum dependent types to embed a language of terms, RAFL, with resource usage properties and associated correctness proofs. Since these properties and associated proofs are directly expressed inRAFL through a formal logic, it follows that correctly specified resourc...

2008
F. Guim J. Corbalan

Job scheduling policies for HPC centers have been extensively studied in the last few years, specially backfilling based policies. Almost all of these studies have been done using simulation tools. All the existent simulators use the runtime (either estimated or real) provided in the workload as a basis of their simulations. In our previous work we analyzed the impact on system performance of c...

2012
Mandeep Kaur

Grid Schedulers aggregate the Grid resource that belongs to multiple administrative domains in a transparent manner. The Grid resource providers have their own local resources policies for the resources that reflects the restrictions on the resource what they are providing to the users. However, the Grid users are submitting the user application along with their desired requirements for the job...

2014
SERGIU RAFILIU PETRU ELES ZEBO PENG MICHAEL LEMMON

Today’s embedded systems are exposed to variations in resource usage due to complex software applications, hardware platforms, and impact of the run-time environments. When these variations are large and e ciency is required, on-line resource managers may be deployed on the system to help it control its resource usage. An often neglected problem is whether these resource managers are stable, me...

2002
Salvatore D’Antonio Marcello Esposito Mauro Gargiulo Simon Pietro Romano Giorgio Ventre

This work deals with the main issues related to monitoring in the framework of the CADENUS project. Having defined an architecture capable to support dynamic service creation, configuration and delivery on top of Premium IP networks, the need arises to keep track of a number of parameters related to the quality of the service that has been negotiated and for which a formal contract (i.e. Servic...

2006
NAOKI KOBAYASHI KOHEI SUENAGA LUCIAN WISCHIK

We propose a type-based resource usage analysis for the π-calculus extended with resource creation/access primitives. The goal of the resource usage analysis is to statically check that a program accesses resources such as files and memory in a valid manner. Our type system is an extension of previous behavioral type systems for the pi-calculus, and can guarantee the safety property that no inv...

Journal: :Mathematical Structures in Computer Science 2008
Massimo Bartoletti Pierpaolo Degano Gian Luigi Ferrari Roberto Zunino

We propose a model for specifying, analysing and enforcing safe usageof resources. Our usage policies allow for parametricity over resources,and they can be enforced through finite state automata. The patternsof resource access and creation are described through a basic calculus ofusages. In spite of the augmented flexibility given by resource creationand by policy parametri...

2005
Naoki Kobayashi Kohei Suenaga Lucian Wischik

We propose a type-based resource usage analysis for the πcalculus extended with resource creation/access primitives. The goal of the resource usage analysis is to statically check that a program accesses resources such as files and memory in a valid manner. Our type system is an extension of previous behavioral type systems for the pi-calculus, and can guarantee the safety property that no inva...

Journal: :CoRR 2014
Ankur Sahai

1 Abstract In the context of GreenPAD project it is important to predict the energy consumption of individual VMs / workload for optimal scheduling (running those VMs which require higher energy when there is more green energy available and vice-versa) in order to maximize green energy utilization. This involves the following tasks: 1. VM energy measurement for different configurations (flavor ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید