Sciweavers

128 search results - page 5 / 26
» Forward Analysis of Depth-Bounded Processes
Sort
View
TWC
2008
112views more  TWC 2008»
13 years 7 months ago
Performance analysis of single relay selection in rayleigh fading
We provide closed-form expressions for the outage and bit error probability (BEP) of uncoded, threshold-based opportunistic relaying (OR) and selection cooperation (SC), at arbitra...
Diomidis S. Michalopoulos, George K. Karagiannidis
SIGCOMM
2005
ACM
14 years 28 days ago
Fast hash table lookup using extended bloom filter: an aid to network processing
Hash table is used as one of the fundamental modules in several network processing algorithms and applications such as route lookup, packet classification, per-flow state manage...
Haoyu Song, Sarang Dharmapurikar, Jonathan S. Turn...
INFOCOM
2002
IEEE
14 years 9 days ago
Avoiding Instability during Graceful Shutdown of OSPF
Abstract—Many recent router architectures decouple the routing engine from the forwarding engine, so that packet forwarding can continue even when the routing process is not acti...
Aman Shaikh, Rohit Dube, Anujan Varma
WEBI
2010
Springer
13 years 5 months ago
Research Interests: Their Dynamics, Structures and Applications in Web Search Refinement
For most scientists, their research interests are dynamically changing all the time. Through an analysis of research interests, we find that all the changes are with some character...
Yi Zeng, Erzhong Zhou, Yulin Qin, Ning Zhong
DAC
2004
ACM
14 years 8 months ago
Statistical optimization of leakage power considering process variations using dual-Vth and sizing
timing analysis tools to replace standard deterministic static timing analyzers whereas [8,27] develop approaches for the statistical estimation of leakage power considering within...
Ashish Srivastava, Dennis Sylvester, David Blaauw