Sciweavers

22193 search results - page 4347 / 4439
» Multiple Restricted Multiplication
Sort
View
135
Voted
TON
2010
163views more  TON 2010»
15 years 29 days ago
Toward practical opportunistic routing with intra-session network coding for mesh networks
—We consider opportunistic routing in wireless mesh networks. We exploit the inherent diversity of the broadcast nature of wireless by making use of multi-path routing. We presen...
Bozidar Radunovic, Christos Gkantsidis, Peter B. K...
124
Voted
TPDS
2010
194views more  TPDS 2010»
15 years 29 days ago
On the Benefits of Cooperative Proxy Caching for Peer-to-Peer Traffic
—This paper analyzes the potential of cooperative proxy caching for peer-to-peer (P2P) traffic as a means to ease the burden imposed by P2P traffic on Internet Service Providers ...
Mohamed Hefeeda, Behrooz Noorizadeh
127
Voted
TPDS
2010
94views more  TPDS 2010»
15 years 29 days ago
MIMO Power Control for High-Density Servers in an Enclosure
—Power control is becoming a key challenge for effectively operating a modern data center. In addition to reducing operating costs, precisely controlling power consumption is an ...
Xiaorui Wang, Ming Chen, Xing Fu
122
Voted
TSE
2010
118views more  TSE 2010»
15 years 29 days ago
Exception Handling Patterns for Process Modeling
—Process modeling allows for analysis and improvement of processes that coordinate multiple people and tools working together to carry out a task. Process modeling typically focu...
Barbara Staudt Lerner, Stefan Christov, Leon J. Os...
136
Voted
TSE
2010
180views more  TSE 2010»
15 years 29 days ago
Aspect-Oriented Race Detection in Java
—In the past, researchers have developed specialized programs to aid programmers in detecting concurrent programming errors such as deadlocks, livelocks, starvation, and data rac...
Eric Bodden, Klaus Havelund
« Prev « First page 4347 / 4439 Last » Next »