Sciweavers

11215 search results - page 2126 / 2243
» Skeleton - Easy Simulation System
Sort
View
TON
2008
103views more  TON 2008»
13 years 10 months ago
Fixed point analysis of single cell IEEE 802.11e WLANs: uniqueness and multistability
We consider the vector fixed point equations arising out of the analysis of the saturation throughput of a single cell IEEE 802.11e (EDCA) wireless local area network with nodes th...
Venkatesh Ramaiyan, Anurag Kumar, Eitan Altman
TPDS
2008
164views more  TPDS 2008»
13 years 10 months ago
Hierarchical Scheduling for Symmetric Multiprocessors
Hierarchical scheduling has been proposed as a scheduling technique to achieve aggregate resource partitioning among related groups of threads and applications in uniprocessor and...
Abhishek Chandra, Prashant J. Shenoy
TPDS
2008
116views more  TPDS 2008»
13 years 10 months ago
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
Most trust models in Peer-to-Peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence,...
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Hu...
JSAC
2007
104views more  JSAC 2007»
13 years 10 months ago
Tomlinson-Harashima Precoding for Broadcast Channels with Uncertainty
— We consider the design of Tomlinson-Harashima (TH) precoders for broadcast channels in the presence of channel uncertainty. For systems in which uplink-downlink reciprocity is ...
Michael Botros Shenouda, Timothy N. Davidson
TVLSI
2008
105views more  TVLSI 2008»
13 years 10 months ago
Robust Concurrent Online Testing of Network-on-Chip-Based SoCs
Lifetime concerns for complex systems-on-a-chip (SoC) designs due to decreasing levels in reliability motivate the development of solutions to ensure reliable operation. A precurso...
Praveen Bhojwani, Rabi N. Mahapatra
« Prev « First page 2126 / 2243 Last » Next »