Gate sizing and threshold voltage (Vt) assignment are popular techniques for circuit timing and power optimization. Existing methods, by and large, are either sensitivity-driven h...
Abstract. Model-to-model (M2M) transformation consists in transforming models from a source to a target language. Many transformation languages exist, but few of them combine a dec...
Fernando Orejas, Esther Guerra, Juan de Lara, Hart...
We evaluate the capacity of an IEEE 802.16d and IEEE 802.11g testbed to simultaneously carry emulated H.264/AVC video and Speex VoIP and present results from an extensive measurem...
Kostas Pentikousis, Jarno Pinola, Esa Piri, Frerk ...
— In the paper, we propose a novel scheduling mechanism without modifying the existing IEEE 802.11 MAC, called wireless Radio-Matching Protocol (RMP). It takes account of interfe...
Abstract. In nested mobile networks with NEMO basic support protocol [3], the pinball routing problem occurs because since it is based on bi-directional tunneling between the mobil...
Jeonghoon Park, Sangho Lee, Youho Lee, Hyunseung C...