Sciweavers

5891 search results - page 1103 / 1179
» On the Computational Security of a Distributed Key Distribut...
Sort
View
155
Voted
MOBIHOC
2005
ACM
16 years 4 months ago
On the node-scheduling approach to topology control in ad hoc networks
: In this paper, we analyze the node scheduling approach of topology control in the context of reliable packet delivery. In node scheduling, only a minimum set of nodes needed for ...
Budhaditya Deb, Badri Nath
152
Voted
EUROSYS
2007
ACM
16 years 1 months ago
Thread clustering: sharing-aware scheduling on SMP-CMP-SMT multiprocessors
The major chip manufacturers have all introduced chip multiprocessing (CMP) and simultaneous multithreading (SMT) technology into their processing units. As a result, even low-end...
David K. Tam, Reza Azimi, Michael Stumm
130
Voted
IWCMC
2006
ACM
15 years 10 months ago
Voice capacity under quality constraints for IEEE 802.11a based WLANs
The communication of voice over wireless local area networks (WLANs) is influenced by the choice of speech codec, packetization interval and PHY layer bit rates. These choices a...
Niranjan Shetty, Sayantan Choudhury, Jerry D. Gibs...
188
Voted
ADHOCNOW
2004
Springer
15 years 10 months ago
A Rate-Adaptive MAC Protocol for Low-Power Ultra-Wide Band Ad-Hoc Networks
Recent theoretical results show that it is optimal to allow interfering sources to transmit simultaneously as long as they are outside a well-defined exclusion region around a de...
Ruben Merz, Jean-Yves Le Boudec, Jörg Widmer,...
ISLPED
2003
ACM
129views Hardware» more  ISLPED 2003»
15 years 10 months ago
A critical analysis of application-adaptive multiple clock processors
Enabled by the continuous advancement in fabrication technology, present day synchronous microprocessors include more than 100 million transistors and have clock speeds well in ex...
Emil Talpes, Diana Marculescu
« Prev « First page 1103 / 1179 Last » Next »