Sciweavers

2446 search results - page 247 / 490
» Characterizing the Performance of
Sort
View
138
Voted
IWDC
2001
Springer
101views Communications» more  IWDC 2001»
15 years 9 months ago
Resource Stealing in Endpoint Controlled Multi-class Networks
Abstract. Endpoint admission control is a mechanism for achieving scalable services by pushing quality-of-service functionality to end hosts. In particular, hosts probe the network...
Susana Sargento, Rui Valadas, Edward W. Knightly
156
Voted
MMNS
2001
151views Multimedia» more  MMNS 2001»
15 years 6 months ago
Analysis of Random Access Protocol under Bursty Traffic
Aloha-type random-access protocols have been employed as access control protocols in wireline and wireless, stationary and mobile, multiple-access communications networks. They are...
Jianbo Gao, Izhak Rubin
164
Voted
ISCA
2012
IEEE
302views Hardware» more  ISCA 2012»
13 years 7 months ago
Scale-out processors
The emergence of global-scale online services has galvanized scale-out software, characterized by splitting vast datasets and massive computation across many independent servers. ...
Pejman Lotfi-Kamran, Boris Grot, Michael Ferdman, ...
SENSYS
2003
ACM
15 years 9 months ago
Matching data dissemination algorithms to application requirements
A distinguishing characteristic of wireless sensor networks is the opportunity to exploit characteristics of the application at lower layers. This approach is encouraged by device...
John S. Heidemann, Fabio Silva, Deborah Estrin
CVPR
2005
IEEE
16 years 6 months ago
Semi-Supervised Cross Feature Learning for Semantic Concept Detection in Videos
For large scale automatic semantic video characterization, it is necessary to learn and model a large number of semantic concepts. But a major obstacle to this is the insufficienc...
Rong Yan, Milind R. Naphade