Sciweavers

3202 search results - page 401 / 641
» Memory access scheduling
Sort
View
CAL
2002
13 years 8 months ago
Exploiting Fixed Programs in Embedded Systems: A Loop Cache Example
Embedded systems commonly execute one program for their lifetime. Designing embedded system architectures with configurable components, such that those components can be tuned to t...
Ann Gordon-Ross, Susan Cotterell, Frank Vahid
HPCA
2005
IEEE
14 years 8 months ago
A Small, Fast and Low-Power Register File by Bit-Partitioning
A large multi-ported register file is indispensable for exploiting instruction level parallelism (ILP) in today's dynamically scheduled superscalar processors. The number of ...
Masaaki Kondo, Hiroshi Nakamura
BROADCOM
2008
IEEE
14 years 2 months ago
A Routing Metric and Algorithm for IEEE802.16 Mesh Networks
— The rapid growth of high-speed multimedia services for mobile, residential and small business customers has created an increasing demand for last mile broadband access. The wir...
Ntsibane Ntlatlapa
QOFIS
2004
Springer
14 years 1 months ago
Load Analysis of Topology-Unaware TDMA MAC Policies for Ad Hoc Networks
Medium Access Control (MAC) policies in which the scheduling time slots are allocated irrespectively of the underline topology are suitable for ad-hoc networks, where nodes can ent...
Konstantinos Oikonomou, Ioannis Stavrakakis
INFOCOM
2003
IEEE
14 years 1 months ago
An FDD Wideband CDMA MAC Protocol for Wireless Multimedia Networks
Abstract—A medium access control (MAC) protocol is developed for wireless multimedia networks based on frequency division duplex (FDD) wideband code division multiple access (CDM...
Xudong Wang