Sciweavers

1852 search results - page 192 / 371
» Block-level link analysis
Sort
View
DAMON
2006
Springer
14 years 29 days ago
Processing-in-memory technology for knowledge discovery algorithms
The goal of this work is to gain insight into whether processingin-memory (PIM) technology can be used to accelerate the performance of link discovery algorithms, which represent ...
Jafar Adibi, Tim Barrett, Spundun Bhatt, Hans Chal...
CCECE
2009
IEEE
14 years 18 days ago
Prohibitive-link Detection and Routing Protocol
In this paper we investigate the limits of routing according to left- or righthand rule (LHR). Using LHR, a node upon receipt of a message will forward to the neighbour that sits ...
Marwan Fayed, Hussein T. Mouftah
IWCMC
2010
ACM
13 years 11 months ago
Using connection expansion to reduce control traffic in MANETs
We consider the problem of control traffic overhead in MANETs with long-lived connections, operating under a reactive routing protocol (e.g. AODV). In such settings, control traff...
Zeki Bilgin, Bilal Khan, Ala I. Al-Fuqaha
DAC
2005
ACM
13 years 11 months ago
Smart diagnostics for configurable processor verification
This paper describes a novel technique called Embedded Test-bench Control (ETC), extensively used in the verification of Tensilica’s latest configurable processor. Conventional ...
Sadik Ezer, Scott Johnson
NOSSDAV
2010
Springer
13 years 11 months ago
Wireless network interface energy conservation for bottlenecked first mile networks
Placeshifting systems stream videos from the home to a single remote user using the limited upstream capacity of the home broadband link. We analyze the behavior of two placeshift...
Surendar Chandra