Zobrazeno 1 - 10
of 64
pro vyhledávání: '"Bellur, Umesh"'
Proof-of-Work~(PoW) based blockchains typically allocate only a tiny fraction (e.g., less than 1% for Ethereum) of the average interarrival time~($\mathbb{I}$) between blocks for validating transactions. A trivial increase in validation time~($\tau$)
Externí odkaz:
http://arxiv.org/abs/2005.11791
The proliferation of application specific cyber-physical systems coupled with the emergence of a variety of attacks on such systems (malware such as Mirai and Hajime) underlines the need to secure such networks. Most existing security efforts have fo
Externí odkaz:
http://arxiv.org/abs/2004.12442
A critical challenge is to enable IoT application development with minimal effort from various stakeholders involved in the development process. Several approaches to tacking this challenge have been proposed in the fields of wireless sensor networks
Externí odkaz:
http://arxiv.org/abs/1606.02119
Autor:
Mishra, Mayank, Bellur, Umesh
Existing VM placement schemes have measured their effectiveness solely by looking either Physical Machine's resources(CPU, memory) or network resource. However, real applications use all resource types to varying degrees. The result of applying exist
Externí odkaz:
http://arxiv.org/abs/1506.07020
Power consumption costs takes upto half of operational expenses of datacenters making power management a critical concern. Advances in processor technology provide fine-grained control over operating frequency and voltage of processors and this contr
Externí odkaz:
http://arxiv.org/abs/1411.3201
Cloud computing provides a computing platform for the users to meet their demands in an efficient, cost-effective way. Virtualization technologies are used in the clouds to aid the efficient usage of hardware. Virtual machines (VMs) are utilized to s
Externí odkaz:
http://arxiv.org/abs/1011.5064
Publikováno v:
In Procedia Computer Science 2014 29:62-72
Autor:
SAMANT, DURGESH1 (AUTHOR) durgesh.samant@cse.iitb.ac.in, BELLUR, UMESH1 (AUTHOR) umesh@cse.iitb.ac.in
Publikováno v:
ACM Computing Surveys. Jul2016, Vol. 49 Issue 1, p16:1-16:36. 36p.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.