Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
DAC
2012
ACM
8 years 8 months ago
Approaching the theoretical limits of a mesh NoC with a 16-node chip prototype in 45nm SOI
In this paper, we present a case study of our chip prototype of a 16-node 4x4 mesh NoC fabricated in 45nm SOI CMOS that aims to simultaneously optimize energy-latency-throughput f...
Sunghyun Park, Tushar Krishna, Chia-Hsin Owen Chen...
TWC
2010
10 years 24 days ago
Enhancing cell-edge performance: a downlink dynamic interference avoidance scheme with inter-cell coordination
Interference management has been a key concept for designing future high data-rate wireless systems that are required to employ dense reuse of spectrum. Static or semistatic interf...
Mahmudur Rahman, Halim Yanikomeroglu
TON
2010
179views more  TON 2010»
10 years 24 days ago
Network Coding-Aware Routing in Wireless Networks
A recent approach--COPE, presented by Katti et al. (Proc. ACM SIGCOMM 2006, pp. 243
Sudipta Sengupta, Shravan K. Rayanchu, Suman Baner...
TON
2010
167views more  TON 2010»
10 years 24 days ago
A Machine Learning Approach to TCP Throughput Prediction
TCP throughput prediction is an important capability in wide area overlay and multi-homed networks where multiple paths may exist between data sources and receivers. In this paper...
Mariyam Mirza, Joel Sommers, Paul Barford, Xiaojin...
TIT
2010
129views Education» more  TIT 2010»
10 years 24 days ago
Random access in wireless networks with overlapping cells
We study cellular-like wireless networks in which the cells may overlap substantially, and a common channel is used for all cells. Thus, transmissions intended for one destination ...
Gam D. Nguyen, Jeffrey E. Wieselthier, Anthony Eph...
TC
2010
10 years 25 days ago
High Throughput Disk Scheduling with Fair Bandwidth Distribution
Mainstream applications
Paolo Valente, Fabio Checconi
PE
2010
Springer
212views Optimization» more  PE 2010»
10 years 26 days ago
Modeling TCP throughput: An elaborated large-deviations-based model and its empirical validation
In today's Internet, a large part of the traffic is carried using the TCP transport protocol. Characterization of the variations of TCP traffic is thus a major challenge, bot...
Patrick Loiseau, Paulo Gonçalves, Julien Ba...
JCIT
2010
162views more  JCIT 2010»
10 years 27 days ago
Call Admission Control Strategy for System Throughput Maximization Using DOVE
In this paper we propose a signal-to-interference (SIR)-based distributed Call Admission Control (CAC) strategy that considers the combined effect of both call and packet level qu...
Tanzilah Noor Shabnam, Md. Imdadul Islam, M. R. Am...
MONET
2011
10 years 1 months ago
Mathematical Analysis of Throughput Bounds in Random Access with ZigZag Decoding
— We investigate the throughput improvement that ZIGZAG decoding (Gollakota and Katabi (2008)) can achieve in multi-user random access systems. ZIGZAG is a recently proposed 802....
Jeongyeup Paek, Michael J. Neely
MICRO
2011
IEEE
407views Hardware» more  MICRO 2011»
10 years 1 months ago
Thread Cluster Memory Scheduling
In a modern chip-multiprocessor system, memory is a shared resource among multiple concurrently executing threads. The memory scheduling algorithm should resolve memory contention...
Yoongu Kim, Michael Papamichael, Onur Mutlu, Mor H...
books