Sciweavers

1831 search results - page 264 / 367
» Time Constraints in Workflow Systems
Sort
View
144
Voted
ICC
2007
IEEE
125views Communications» more  ICC 2007»
15 years 10 months ago
Network-Wide Resource Optimization of Wireless OFDMA Mesh Networks with Multiple Radios
— We consider the problem of joint end-to-end rate optimization and radio resource management in wireless OFDMA-based mesh networks. Radio units equipped with multiple radio inte...
Pablo Soldati, Mikael Johansson
146
Voted
INFOCOM
2007
IEEE
15 years 10 months ago
A Graph-Based Model for Disconnected Ad Hoc Networks
— Recently, research on disconnected networks has been fostered by several studies on delay-tolerant networks, which are designed in order to sustain disconnected operations. We ...
Francesco De Pellegrini, Daniele Miorandi, Iacopo ...
151
Voted
EUC
2005
Springer
15 years 9 months ago
Optimizing Nested Loops with Iterational and Instructional Retiming
Abstract. Embedded systems have strict timing and code size requirements. Retiming is one of the most important optimization techniques to improve the execution time of loops by in...
Chun Xue, Zili Shao, Meilin Liu, Mei Kang Qiu, Edw...
RTSS
2003
IEEE
15 years 9 months ago
Contention-Free Periodic Message Scheduler Medium Access Control in Wireless Sensor / Actuator Networks
This paper presents a time division multiple access medium access control protocol for wireless sensor / actuator networks implemented with a contention-free message scheduler. A ...
Thomas W. Carley, Moussa A. Ba, Rajeev Barua, Davi...
150
Voted
SASN
2003
ACM
15 years 9 months ago
Modeling vulnerabilities of ad hoc routing protocols
The purpose of this work is to automate the analysis of ad hoc routing protocols in the presence of attackers. To this end, a formal model of protocol behavior is developed in whi...
Shahan Yang, John S. Baras