Sciweavers

1056 search results - page 122 / 212
» Identifying and Exploiting Ultrametricity
Sort
View
ICNP
2005
IEEE
14 years 3 months ago
Routing in Ad-hoc Networks with MIMO Links
Smart antennas include a broad variety of antenna technologies ranging from the simple switched beams to the sophisticated digital adaptive arrays. While beam-forming antennas are...
Karthikeyan Sundaresan, Raghupathy Sivakumar
ICRA
2005
IEEE
161views Robotics» more  ICRA 2005»
14 years 3 months ago
Leveraging Limited Autonomous Mobility to Frame Attractive Group Photos
- Robot photographers have appeared in a variety of novelty settings over the past few years and typically have exploited rudimentary image-content-based approaches to identifying ...
Jason Campbell, Padmanabhan Pillai
INFOCOM
2005
IEEE
14 years 3 months ago
Farsighted users harness network time-diversity
Abstract— Fluctuations in network conditions are a common phenomenon. They arise in the current wired Internet due to changes in demand, and in wireless networks due to changing ...
Peter B. Key, Laurent Massoulié, Milan Vojn...
ISCA
2005
IEEE
134views Hardware» more  ISCA 2005»
14 years 3 months ago
An Architecture Framework for Transparent Instruction Set Customization in Embedded Processors
Instruction set customization is an effective way to improve processor performance. Critical portions of application dataflow graphs are collapsed for accelerated execution on s...
Nathan Clark, Jason A. Blome, Michael L. Chu, Scot...
ISCA
2005
IEEE
154views Hardware» more  ISCA 2005»
14 years 3 months ago
Temporal Streaming of Shared Memory
Coherent read misses in shared-memory multiprocessors account for a substantial fraction of execution time in many important scientific and commercial workloads. We propose Tempor...
Thomas F. Wenisch, Stephen Somogyi, Nikolaos Harda...