Sciweavers

11112 search results - page 2152 / 2223
» Computing Stuttering Simulations
Sort
View
102
Voted
WDAG
2007
Springer
100views Algorithms» more  WDAG 2007»
15 years 8 months ago
Scalable Load-Distance Balancing
We introduce the problem of load-distance balancing in assigning users of a delay-sensitive networked application to servers. We model the service delay experienced by a user as a ...
Edward Bortnikov, Israel Cidon, Idit Keidar
139
Voted
BROADNETS
2006
IEEE
15 years 8 months ago
CAM-MAC: A Cooperative Asynchronous Multi-Channel MAC Protocol for Ad Hoc Networks
— Medium access control (MAC) protocols have been studied under different contexts for several years now. In all these MAC protocols, nodes make independent decisions on when to ...
Tie Luo, Mehul Motani, Vikram Srinivasan
124
Voted
BROADNETS
2006
IEEE
15 years 8 months ago
An Energy Efficient and Accurate Slot Synchronization Scheme for Wireless Sensor Networks
Existing slotted channel access schemes in wireless networks assume that slot boundaries at all nodes are synchronized. In practice, relative clock drifts among nodes cause slot mi...
Lillian Dai, Prithwish Basu, Jason Redi
122
Voted
COMPSAC
2006
IEEE
15 years 8 months ago
An Agent-Based Metric for Quality of Services over Wireless Networks
In a wireless LAN environment, clients tend to associate with the nearest access point (AP) which usually provides the strongest signal. However, this does not guarantee that user...
Yaw-Chung Chen, Wen-Yen Chen
116
Voted
DATE
2006
IEEE
84views Hardware» more  DATE 2006»
15 years 8 months ago
Vulnerability analysis of L2 cache elements to single event upsets
Memory elements are the most vulnerable system component to soft errors. Since memory elements in cache arrays consume a large fraction of the die in modern microprocessors, the p...
Hossein Asadi, Vilas Sridharan, Mehdi Baradaran Ta...
« Prev « First page 2152 / 2223 Last » Next »