Sciweavers

264 search results - page 31 / 53
» Source-Based Trace Exploration
Sort
View
IPPS
2005
IEEE
14 years 3 months ago
A Dependency Chain Clustered Microarchitecture
In this paper we explore a new clustering approach for reducing the complexity of wide issue in-order processors based on EPIC architectures. Complexity effectiveness is achieved ...
Satish Narayanasamy, Hong Wang 0003, Perry H. Wang...
JSAC
2007
104views more  JSAC 2007»
13 years 9 months ago
Characterizing Peer-to-Peer Streaming Flows
— The fundamental advantage of peer-to-peer (P2P) multimedia streaming applications is to leverage peer upload capacities to minimize bandwidth costs on dedicated streaming serve...
Chuan Wu, Baochun Li, Shuqiao Zhao
CCR
2002
102views more  CCR 2002»
13 years 9 months ago
DNS performance and the effectiveness of caching
This paper presents a detailed analysis of traces of DNS and associated TCP traffic collected on the Internet links of the MIT Laboratory for Computer Science and the Korea Advance...
Jaeyeon Jung, Emil Sit, Hari Balakrishnan, Robert ...
TCS
2010
13 years 8 months ago
Canonical finite state machines for distributed systems
There has been much interest in testing from finite state machines (FSMs) as a result of their suitability for modelling or specifying state-based systems. Where there are multip...
Robert M. Hierons
IMC
2010
ACM
13 years 7 months ago
Characterizing radio resource allocation for 3G networks
3G cellular data networks have recently witnessed explosive growth. In this work, we focus on UMTS, one of the most popular 3G mobile communication technologies. Our work is the f...
Feng Qian, Zhaoguang Wang, Alexandre Gerber, Zhuoq...