A Framework and Toolkit for Understanding User Comfort with Resource Borrowing
暂无分享,去创建一个
[1] Fred Douglis,et al. Transparent process migration: Design alternatives and the sprite implementation , 1991, Softw. Pract. Exp..
[2] Akinori Komatsubara. Psychological Upper and Lower Limits of System Response Time and User's Preference on Skill Level , 1997, HCI.
[3] Carson Jonathan Reynolds,et al. The sensing and measurement of frustration with computers , 2001 .
[4] DouglisFred,et al. Transparent process migration , 1991 .
[5] Antony I. T. Rowstron,et al. Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.
[6] Kirk L. Johnson,et al. Overcast: reliable multicasting with on overlay network , 2000, OSDI.
[7] Srinivasan Seshan,et al. Enabling conferencing applications on the internet using an overlay muilticast architecture , 2001, SIGCOMM '01.
[8] Srinivasan Seshan,et al. Enabling conferencing applications on the internet using an overlay muilticast architecture , 2001, SIGCOMM 2001.
[9] Jonathan T. Klein,et al. Computer response to user frustration , 1998 .
[10] Robert Morris,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM 2001.
[11] Kyung D. Ryu,et al. Efficient Network and I/O Throttling for Fine-Grain Cycle Stealing , 2001, ACM/IEEE SC 2001 Conference (SC'01).
[12] Jeffrey K. Hollingsworth,et al. Fine-Grain Cycle Stealing for Networks of Workstations , 1998, Proceedings of the IEEE/ACM SC98 Conference.
[13] Andrew A. Chien,et al. Entropia: architecture and performance of an enterprise desktop grid system , 2003, J. Parallel Distributed Comput..
[14] David A. Patterson,et al. A case for networks of workstations (now) , 1994, Symposium Record Hot Interconnects II.
[15] Mustaque Ahamad,et al. Workload modeling for highly interactive applications , 1999, SIGMETRICS '99.
[16] David P. Anderson,et al. A new major SETI project based on Project Serendip data and 100 , 1997 .
[17] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[18] Miron Livny,et al. The Available Capacity of a Privately Owned Workstation Environmont , 1991, Perform. Evaluation.
[19] Peter A. Dinda,et al. The statistical properties of host load , 1999, Sci. Program..
[20] Justin Dolskeinterhack,et al. A Brute Force Search of DES KeyspaceMatt Curtin , 1997 .
[21] David W. Embley,et al. Behavioral Aspects of Text Editors , 1981, CSUR.
[22] David E. Culler,et al. A case for NOW (networks of workstation) , 1995, PODC '95.
[23] Ian T. Foster,et al. Mapping the Gnutella Network: Properties of Large-Scale Peer-to-Peer Systems and Implications for System Design , 2002, ArXiv.
[24] Zheng Wang,et al. Using latency to evaluate interactive system performance , 1996, OSDI '96.
[25] Miron Livny,et al. Condor-a hunter of idle workstations , 1988, [1988] Proceedings. The 8th International Conference on Distributed.
[26] A DindaPeter. The statistical properties of host load , 1999 .
[27] Ian T. Foster,et al. Condor-G: A Computation Management Agent for Multi-Institutional Grids , 2004, Cluster Computing.