Sciweavers

2932 search results - page 532 / 587
» Higher order mining
Sort
View
INFOCOM
2007
IEEE
14 years 2 months ago
Software TDMA for VoIP Applications Over IEEE802.11 Wireless LAN
Abstract—An emerging killer application for enterprise wireless LANs (WLANs) is voice over IP (VoIP) telephony, which promises to greatly improve the reachability and mobility of...
Fanglu Guo, Tzi-cker Chiueh
INFOCOM
2007
IEEE
14 years 2 months ago
Residual-Based Measurement of Peer and Link Lifetimes in Gnutella Networks
—Existing methods of measuring lifetimes in P2P systems usually rely on the so-called Create-Based Method (CBM) [16], which divides a given observation window into two halves and...
Xiaoming Wang, Zhongmei Yao, Dmitri Loguinov
IPPS
2007
IEEE
14 years 2 months ago
Optimal Assignment of a Tree-Structured Context Reasoning Procedure onto a Host-Satellites System
In this paper, we study the problem of an optimal assignment of a tree-structured context reasoning procedure onto the computation resources in a hostsatellites configuration. The...
Hailiang Mei, Pravin Pawar, Ing Widya
ISQED
2007
IEEE
127views Hardware» more  ISQED 2007»
14 years 2 months ago
Sensitivity Based Link Insertion for Variation Tolerant Clock Network Synthesis
Clock distribution is one of the key limiting factors in any high speed, sub-100nm VLSI design. Unwanted clock skews, caused by variation effects like manufacturing variations, po...
Joon-Sung Yang, Anand Rajaram, Ninghy Shi, Jian Ch...
GLOBECOM
2007
IEEE
14 years 2 months ago
GMPLS-Based Hybrid 1+N Link Protection Over p-Cycles: Design and Performance
—In [1], the author introduced a strategy to use network coding on p-Cycles in order to provide 1+N protection for straddling connections and links against single link failures i...
Ahmed E. Kamal