M Parashar, JC Browne - Proceedings of the IEEE, 2005 - ieeexplore.ieee.org
The Grid is rapidly emerging as the dominant paradigm for wide area distributed application systems. As a result, there is a need for modeling and analyzing the characteristics and …
M Parashar - Autonomic Computing, 2018 - api.taylorfrancis.com
50 Autonomic Computing: Concepts, Infrastructure, and Applications used by biological systems to deal with similar challenges. This chapter motivates and introduces autonomic …
M Parashar, Z Li, H Liu, V Matossian, C Schmidt - Self-star Workshop, 2004 - Springer
The increasing complexity, heterogeneity and dynamism of emerging pervasive Grid environments and applications has necessitated the development of autonomic self …
R Mason, W Kelly - Conferences in Research and Practice in …, 2005 - eprints.qut.edu.au
Existing cycle-stealing frameworks are generally based on simple client-server or hierarchical style architectures. G2: P2P moves cycle-stealing into the'pure'peer-to-peer …
M Parashar, JM Pierson - … Conference on Computer Mathematics & its …, 2007 - Citeseer
Advances in computing and communication technologies are rapidly leading to a revolution in the Grid concept and the realization of a Pervasive Grid that seamlessly integrates …
W Kelly, L Frische - Proceedings of the 2003 APAC Conference on …, 2003 - Citeseer
This paper presents G2 Remoting, a generic remote-object based framework for creating cycle-stealing parallel applications. The framework is built using the extensibility features of …
I would like to thank my Ph. D. supervisors Prof. Dr. Kurt Rothermel and Prof. Dr. Wolfgang Küchlin for giving me the opportunity to work in their groups. My special thanks go to my co …
P Walsh, P Fenton - Proceedings of the 2004 Congress on …, 2004 - ieeexplore.ieee.org
Genetic algorithms (GAs) have long been applied to tackling scheduling problems, particularly JSP, with varying degrees of success. However despite advances in GA theory …
W Kelly, P Roe - … on High Performance Computing and Grid in …, 2004 - ieeexplore.ieee.org
Cycle stealing systems use idle PCs to create virtual supercomputers. Utilizing third party PCs in this way is very attractive but one fraught with problems. Firstly, writing applications is …