Sciweavers

2294 search results - page 245 / 459
» Efficient Crosstalk Estimation
Sort
View
CONEXT
2009
ACM
14 years 11 months ago
ThunderDome: discovering upload constraints using decentralized bandwidth tournaments
ThunderDome is a system for collaboratively measuring upload bandwidths in ad-hoc peer-to-peer systems. It works by scheduling bandwidth probes between pairs of hosts, wherein eac...
John R. Douceur, James W. Mickens, Thomas Moscibro...
GLVLSI
2008
IEEE
183views VLSI» more  GLVLSI 2008»
14 years 11 months ago
An analytical model for the upper bound on temperature differences on a chip
The main contribution of this work is an analytical model for finding the upper bound on the temperature difference among various locations on the die. The proposed model can be u...
Shervin Sharifi, Tajana Simunic Rosing
IJES
2008
83views more  IJES 2008»
14 years 10 months ago
Evaluating memory architectures for media applications on Coarse-grained Reconfigurable Architectures
Reconfigurable ALU Array (RAA) architectures--representing a popular class of Coarse-grained Reconfigurable Architectures--are gaining in popularity especially for media applicati...
Jong-eun Lee, Kiyoung Choi, Nikil Dutt
IJSNET
2008
126views more  IJSNET 2008»
14 years 10 months ago
Minimising the effect of WiFi interference in 802.15.4 wireless sensor networks
: Interference from colocated networks operating over the same frequency range, becomes an increasingly severe problem as the number of networks overlapping geographically increase...
Razvan Musaloiu-Elefteri, Andreas Terzis
MIS
2008
Springer
130views Multimedia» more  MIS 2008»
14 years 10 months ago
Adaptive and fuzzy approaches for nodes affinity management in wireless ad-hoc networks
In most of the ad-hoc routing protocols, a static link lifetime (LL) is used for a newly discovered neighbors. Though this works well for networks with fixed infrastructures, it is...
Essam Natsheh, Tat Chee Wan