[PDF][PDF] A token based protocol for mutual exclusion in mobile ad hoc networks

B Sharma, RS Bhatia, AK Singh - Journal of information …, 2014 - koreascience.kr
Resource sharing is a major advantage of distributed computing. However, a distributed
computing system may have some physical or virtual resource that may be accessible by a …

[HTML][HTML] Mining and visualising contradictory data

HC Nwagwu, G Okereke, C Nwobodo - Journal of Big Data, 2017 - Springer
Big datasets are often stored in flat files and can contain contradictory data. Contradictory
data undermines the soundness of the information from a noisy dataset. Traditional tools …

Comparative analysis of cluster, utility, grid and cloud computing

D Pal - Utility, Grid and Cloud Computing (May 20, 2021), 2021 - papers.ssrn.com
Computing is a progressing technique. As part of this progression, computing needs
directed by Applications always exceed accessible technology. Computer architects are …

A composition approach to mutual exclusion algorithms for grid applications

J Sopena, F Legond-Aubry, L Arantes… - … on Parallel Processing …, 2007 - ieeexplore.ieee.org
We propose a new composition approach to mutual exclusion algorithms for applications
spread over a grid which is composed of a federation of clusters. Taking into account the …

QoS-enabled distributed mutual exclusion in public clouds

J Edmondson, D Schmidt, A Gokhale - On the Move to Meaningful Internet …, 2011 - Springer
Popular public cloud infrastructures tend to feature centralized, mutual exclusion models for
distributed resources, such as file systems. The result of using such centralized solutions in …

Analytical review of the methods of dynamic load balancing under conditions of uncertainty in the execution time of tasks

EM Shiriaev, NN Kycherov… - 2021 IEEE Conference …, 2021 - ieeexplore.ieee.org
Computationally complex problems can be solved using distributed computing resources,
but the problem arises in the optimal way of distributing tasks between computing nodes in …

[PDF][PDF] Stroke width-based contrast feature for document image binarization

LTK Van, G Lee - Journal of Information Processing Systems, 2014 - koreascience.kr
Automatic segmentation of foreground text from the background in degraded document
images is very much essential for the smooth reading of the document content and …

A token-based mutual exclusion approach to improve collaboration in distributed environments

M Paletta, P Herrero - … Intelligence. Semantic Web, Social Networks and …, 2009 - Springer
This paper presents a token-based mutual exclusion algorithm designed to be used in
Collaborative Distributed Environments by means of multi-agent architecture. This research …

How to use multicast in distributed mutual exclusion algorithms for grid file systems

A Ortiz, F Thiebolt, J Jorda… - … Conference on High …, 2009 - ieeexplore.ieee.org
In a file system, critical sections are represented by means of read or write operations on
useful data (ie files) as well as metadata of the system. The processes must be synchronized …

A comparative analysis of some high performance computing technologies

M Tripathy, CR Tripathy - Compusoft, 2014 - search.proquest.com
Computing is an evolutionary process. As part of this evolution, the computing requirements
driven by applications have always outpaced the available technology. The system …