Sciweavers

4836 search results - page 895 / 968
» Exploring the Similarity Space
Sort
View
P2P
2008
IEEE
137views Communications» more  P2P 2008»
15 years 10 months ago
Hierarchical Codes: How to Make Erasure Codes Attractive for Peer-to-Peer Storage Systems
Redundancy is the basic technique to provide reliability in storage systems consisting of multiple components. A redundancy scheme defines how the redundant data are produced and...
Alessandro Duminuco, Ernst Biersack
GLOBECOM
2007
IEEE
15 years 10 months ago
Degrees of Freedom of the MIMO X Channel
— We provide achievability as well as converse results for the degrees of freedom region of a MIMO X channel, i.e., a system with two transmitters, two receivers, each equipped w...
Syed Ali Jafar, Shlomo Shamai
INFOCOM
2007
IEEE
15 years 10 months ago
Packet Loss Characterization in WiFi-Based Long Distance Networks
— Despite the increasing number of WiFi-based Long Distance (WiLD) network deployments, there is a lack of understanding of how WiLD networks perform in practice. In this paper, ...
Anmol Sheth, Sergiu Nedevschi, Rabin K. Patra, Son...
ISPASS
2007
IEEE
15 years 10 months ago
Cross Binary Simulation Points
Architectures are usually compared by running the same workload on each architecture and comparing performance. When a single compiled binary of a program is executed on many diff...
Erez Perelman, Jeremy Lau, Harish Patil, Aamer Jal...
TASE
2007
IEEE
15 years 10 months ago
Evaluation of SAT-based Bounded Model Checking of ACTL Properties
Bounded model checking (BMC) based on SAT has been introduced as a complementary method to BDD-based symbolic model checking of LTL and ACTL properties in recent years. For genera...
Yanyan Xu, Wei Chen, Liang Xu, Wenhui Zhang