Sciweavers

Share
DAC
2012
ACM
7 years 20 days ago
Approaching the theoretical limits of a mesh NoC with a 16-node chip prototype in 45nm SOI
In this paper, we present a case study of our chip prototype of a 16-node 4x4 mesh NoC fabricated in 45nm SOI CMOS that aims to simultaneously optimize energy-latency-throughput f...
Sunghyun Park, Tushar Krishna, Chia-Hsin Owen Chen...
TWC
2010
8 years 5 months ago
Enhancing cell-edge performance: a downlink dynamic interference avoidance scheme with inter-cell coordination
Interference management has been a key concept for designing future high data-rate wireless systems that are required to employ dense reuse of spectrum. Static or semistatic interf...
Mahmudur Rahman, Halim Yanikomeroglu
TON
2010
179views more  TON 2010»
8 years 5 months ago
Network Coding-Aware Routing in Wireless Networks
A recent approach--COPE, presented by Katti et al. (Proc. ACM SIGCOMM 2006, pp. 243
Sudipta Sengupta, Shravan K. Rayanchu, Suman Baner...
TON
2010
167views more  TON 2010»
8 years 5 months ago
A Machine Learning Approach to TCP Throughput Prediction
TCP throughput prediction is an important capability in wide area overlay and multi-homed networks where multiple paths may exist between data sources and receivers. In this paper...
Mariyam Mirza, Joel Sommers, Paul Barford, Xiaojin...
TIT
2010
129views Education» more  TIT 2010»
8 years 5 months ago
Random access in wireless networks with overlapping cells
We study cellular-like wireless networks in which the cells may overlap substantially, and a common channel is used for all cells. Thus, transmissions intended for one destination ...
Gam D. Nguyen, Jeffrey E. Wieselthier, Anthony Eph...
TC
2010
8 years 5 months ago
High Throughput Disk Scheduling with Fair Bandwidth Distribution
Mainstream applications
Paolo Valente, Fabio Checconi
PE
2010
Springer
212views Optimization» more  PE 2010»
8 years 5 months ago
Modeling TCP throughput: An elaborated large-deviations-based model and its empirical validation
In today's Internet, a large part of the traffic is carried using the TCP transport protocol. Characterization of the variations of TCP traffic is thus a major challenge, bot...
Patrick Loiseau, Paulo Gonçalves, Julien Ba...
JCIT
2010
162views more  JCIT 2010»
8 years 5 months ago
Call Admission Control Strategy for System Throughput Maximization Using DOVE
In this paper we propose a signal-to-interference (SIR)-based distributed Call Admission Control (CAC) strategy that considers the combined effect of both call and packet level qu...
Tanzilah Noor Shabnam, Md. Imdadul Islam, M. R. Am...
MONET
2011
8 years 5 months ago
Mathematical Analysis of Throughput Bounds in Random Access with ZigZag Decoding
— We investigate the throughput improvement that ZIGZAG decoding (Gollakota and Katabi (2008)) can achieve in multi-user random access systems. ZIGZAG is a recently proposed 802....
Jeongyeup Paek, Michael J. Neely
MICRO
2011
IEEE
407views Hardware» more  MICRO 2011»
8 years 5 months ago
Thread Cluster Memory Scheduling
In a modern chip-multiprocessor system, memory is a shared resource among multiple concurrently executing threads. The memory scheduling algorithm should resolve memory contention...
Yoongu Kim, Michael Papamichael, Onur Mutlu, Mor H...
books