Sciweavers

790 search results - page 157 / 158
» Limits of Work-Stealing Scheduling
Sort
View
TCOM
2008
92views more  TCOM 2008»
13 years 5 months ago
Mailbox switch: a scalable two-stage switch architecture for conflict resolution of ordered packets
Abstract-- Traditionally, conflict resolution in an inputbuffered switch is solved by finding a matching between inputs and outputs per time slot. To do this, a switch not only nee...
Cheng-Shang Chang, Duan-Shin Lee, Ying-Ju Shih, Ch...
TIT
1998
112views more  TIT 1998»
13 years 5 months ago
Application of Network Calculus to Guaranteed Service Networks
—We use recent network calculus results to study some properties of lossless multiplexing as it may be used in guaranteed service networks. We call network calculus a set of resu...
Jean-Yves Le Boudec
CN
2008
97views more  CN 2008»
13 years 5 months ago
Cooperative content dissemination in multi-channel WLAN hotspots
It is common for hotspots in airports, cafes, and malls to deploy info-stations on their access points to provide local information such as flight schedule, multimedia access, sal...
Ching-Ju Lin, Cheng-Fu Chou
PVLDB
2008
81views more  PVLDB 2008»
13 years 5 months ago
Optimization of multi-domain queries on the web
Where can I attend an interesting database workshop close to a sunny beach? Who are the strongest experts on service computing based upon their recent publication record and accep...
Daniele Braga, Stefano Ceri, Florian Daniel, David...
INFOCOM
2010
IEEE
13 years 4 months ago
Opportunistic Routing in Multi-radio Multi-channel Multi-hop Wireless Networks
— Two major factors that limit the throughput in multi-hop wireless networks are the unreliability of wireless transmissions and co-channel interference. One promising technique ...
Kai Zeng, Zhenyu Yang, Wenjing Lou