Sciweavers

1016 search results - page 133 / 204
» Explore or Exploit
Sort
View
CODES
2006
IEEE
14 years 3 months ago
The pipeline decomposition tree: : an analysis tool for multiprocessor implementation of image processing applications
Modern embedded systems for image processing involve increasingly complex levels of functionality under real-time and resourcerelated constraints. As this complexity increases, th...
Dong-Ik Ko, Shuvra S. Bhattacharyya
GLOBECOM
2006
IEEE
14 years 3 months ago
Honeycomb Architecture for Energy Conservation in Wireless Sensor Networks
— Reducing energy consumption has been a recent focus of wireless sensor network research. Topology control explores the potential that a dense network has for energy savings. On...
Ren Ping Liu, Glynn Rogers, Sihui Zhou
ICPP
2006
IEEE
14 years 3 months ago
Inter-Overlay Cooperation in High-Bandwidth Overlay Multicast
The cooperation of end users can be exploited to boost the performance of high-bandwidth multicast. While intraoverlay cooperation, the mechanism for cooperation within a single o...
Guang Tan, Stephen A. Jarvis
ISCA
2006
IEEE
154views Hardware» more  ISCA 2006»
14 years 3 months ago
An Integrated Framework for Dependable and Revivable Architectures Using Multicore Processors
This paper presents a high-availability system architecture called INDRA — an INtegrated framework for Dependable and Revivable Architecture that enhances a multicore processor ...
Weidong Shi, Hsien-Hsin S. Lee, Laura Falk, Mrinmo...
WIOPT
2006
IEEE
14 years 3 months ago
Flow-level stability of channel-aware scheduling algorithms
— Channel-aware scheduling strategies provide an effective mechanism for improving the throughput performance in wireless data networks by exploiting channel fluctuations. The p...
Sem C. Borst, Matthieu Jonckheere