Sciweavers

1816 search results - page 296 / 364
» Case study in modeling and simulation validation methodology
Sort
View
84
Voted
RTSS
2007
IEEE
15 years 4 months ago
Sea Depth Measurement with Restricted Floating Sensors
Sea depth monitoring is a critical task to ensure the safe operation of harbors. Traditional schemes largely rely on labor-intensive work and expensive hardware. This study explor...
Zheng Yang, Mo Li, Yunhao Liu
WOWMOM
2005
ACM
90views Multimedia» more  WOWMOM 2005»
15 years 3 months ago
Saturation Throughput Analysis of a System of Interfering IEEE 802.11 WLANs
IEEE 802.11 wireless local area networks that span large buildings or campuses must comprise multiple cells, several of which must necessarily be cochannel cells. It can be shown ...
Manoj K. Panda, Anurag Kumar, S. H. Srinivasan
HPCC
2009
Springer
15 years 2 months ago
On the Performance of Commit-Time-Locking Based Software Transactional Memory
Compared with lock-based synchronization techniques, Software Transactional Memory (STM) can significantly improve the programmability of multithreaded applications. Existing res...
Zhengyu He, Bo Hong
WCNC
2010
IEEE
15 years 1 months ago
MAC Performance Analysis for Vehicle-to-Infrastructure Communication
—The newly emerged vehicular ad hoc network adopts the contention based IEEE 802.11 DCF as its MAC. While it has been extensively studied in the stationary indoor environment (e....
Tom H. Luan, Xinhua Ling, Xuemin Shen
DSN
2008
IEEE
14 years 11 months ago
Reliability of flat XOR-based erasure codes on heterogeneous devices
XOR-based erasure codes are a computationallyefficient means of generating redundancy in storage systems. Some such erasure codes provide irregular fault tolerance: some subsets o...
Kevin M. Greenan, Ethan L. Miller, Jay J. Wylie