Sciweavers

18306 search results - page 3117 / 3662
» Algorithmics in Exponential Time
Sort
View
151
Voted
INFOCOM
2005
IEEE
15 years 10 months ago
On achieving optimal throughput with network coding
— With the constraints of network topologies and link capacities, achieving the optimal end-to-end throughput in data networks has been known as a fundamental but computationally...
Zongpeng Li, Baochun Li, Dan Jiang, Lap Chi Lau
INFOCOM
2005
IEEE
15 years 10 months ago
The impact of imperfect scheduling on cross-layer rate control in wireless networks
— In this paper, we study cross-layer design for rate control in multihop wireless networks. In our previous work, we have developed an optimal cross-layered rate control scheme ...
Xiaojun Lin, Ness B. Shroff
ISCAS
2005
IEEE
183views Hardware» more  ISCAS 2005»
15 years 10 months ago
Battery-aware dynamic voltage scaling in multiprocessor embedded system
— In a battery powered system, a primary design consideration is the battery lifetime. Profile of current drawn from a battery determines its lifetime. Recently in [4] dynamic v...
Yuan Cai, Sudhakar M. Reddy, Irith Pomeranz, Bashi...
ISCAS
2005
IEEE
144views Hardware» more  ISCAS 2005»
15 years 10 months ago
Impact of multicycled scheduling on power-area tradeoffs in behavioural synthesis
— Multicycling is a widely investigated technique for performance optimisation in behavioural synthesis. It allows an operation to execute over two or more control steps with the...
M. A. Ochoa-Montiel, Bashir M. Al-Hashimi, Peter K...
ISCC
2005
IEEE
105views Communications» more  ISCC 2005»
15 years 10 months ago
Enhanced Protection Using Shared Segment Backups in a Multiservice GMPLS-Based Networks
The paper presents a novel protection methodology for setting protected paths in a multiservice GMPLSbased network scenario. By applying the proposed methods, label switched paths...
Anna Urra, Eusebi Calle, José-Luis Marzo
« Prev « First page 3117 / 3662 Last » Next »