Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,297 papers from all fields of science
Search
Sign In
Create Free Account
Commodity computing
Known as:
Commodity server
, Commodity hardware
, Commodity computer
Expand
Commodity computing, or commodity cluster computing, is the use of large numbers of already-available computing components for parallel computing, to…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
19 relations
Amazon Simple Storage Service
Apache Cassandra
EMC ScaleIO
Embedded system
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Assessing Soft- and Hardware Bottlenecks in PC-based Packet Forwarding Systems
Paul Emmerich
,
Daniel Raumer
,
F. Wohlfart
,
G. Carle
2015
Corpus ID: 17221700
Due to grown capabilities of commodity hardware for packet processing and the high flexibility of software, the use of those…
Expand
Highly Cited
2012
Highly Cited
2012
Beyond full duplex wireless
J. Choi
,
S. Hong
,
Mayank Jain
,
S. Katti
,
P. Levis
,
J. Mehlman
Asilomar Conference on Signals, Systems and…
2012
Corpus ID: 547681
Recent work has shown the possibility of implementing full-duplex wireless radios using commodity hardware. We discuss the…
Expand
Highly Cited
2011
Highly Cited
2011
Hand-held Schlieren Photography with Light Field probes
Gordon Wetzstein
,
R. Raskar
,
W. Heidrich
International Conference on Computational…
2011
Corpus ID: 11420655
We introduce a new approach to capturing refraction in transparent media, which we call Light Field Background Oriented Schlieren…
Expand
Review
2011
Review
2011
10 Gbit / s Line Rate Packet Processing Using Commodity Hardware : Survey and new Proposals
L. Rizzo
,
L. Deri
,
A. Cardigliano
2011
Corpus ID: 17012920
The network stack of operating systems has been designed for general purpose communications. Network drivers are responsible for…
Expand
2010
2010
Community Epidemic Detection Using Time-Correlated Anomalies
A. Oliner
,
A. Kulkarni
,
A. Aiken
International Symposium on Recent Advances in…
2010
Corpus ID: 196940
An epidemic is malicious code running on a subset of a community, a homogeneous set of instances of an application. Syzygy is an…
Expand
2008
2008
Interference Avoidance and Control
R. Gummadi
,
Rabin K. Patra
,
H. Balakrishnan
,
E. Brewer
ACM Workshop on Hot Topics in Networks
2008
Corpus ID: 2827231
The throughput of a wireless network is often limited by interference caused by multiple concurrently active nodes . The…
Expand
Review
2004
Review
2004
Failover and Load Sharing in SIP Telephony
Kundan Singh
,
H. Schulzrinne
2004
Corpus ID: 6306743
: We apply some of the existing web server redundancy techniques for high service availability and scalability to the relatively…
Expand
Highly Cited
2002
Highly Cited
2002
Bottleneck Characterization of Dynamic Web Site Benchmarks
C. Amza
,
E. Cecchet
,
+6 authors
W. Zwaenepoel
2002
Corpus ID: 2687941
The absence of benchmarks for Web sites with dynamic content has been a major impediment to research in this area. We describe…
Expand
Highly Cited
2002
Highly Cited
2002
Denali: a scalable isolation kernel
Andrew Whitaker
,
Marianne Shaw
,
S. Gribble
EW 10
2002
Corpus ID: 2875766
The Denali project provides system support for running several mutually distrusting Internet services on the same physical…
Expand
1999
1999
A Stereospecific Elimination to Form Dehydroamino Acids: Synthesis of the Phomopsin Tripeptide Side Chain
Michelle M. Stohlmeyer
,
Hiroko Tanaka
,
T. Wandless
1999
Corpus ID: 85893408
An increasing interest in R,â-dehydroamino acids has developed in recent years based both on their importance as commodity…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE