Sciweavers

790 search results - page 11 / 158
» Limits of Work-Stealing Scheduling
Sort
View
72
Voted
VTC
2008
IEEE
120views Communications» more  VTC 2008»
15 years 4 months ago
Low Backhaul Distributed Detection Strategies for an Interference Limited Uplink Cellular System
— This paper deals with multiuser detection through base station cooperation in uplink interference limited scenarios. At high frequency reuse, each base station not only receive...
Shahid Khattak, Gerhard Fettweis
106
Voted
HICSS
2003
IEEE
200views Biometrics» more  HICSS 2003»
15 years 3 months ago
A Dynamic Assignment Problem in a Mobile System with Limited Bandwidth
The assignment problem originally arising from parallel and distributed computing has been investigated intensively since the 70’s when Harold Stone proposed a method to solve i...
Yang Wang 0006, Thomas Kunz
83
Voted
VTC
2008
IEEE
186views Communications» more  VTC 2008»
15 years 4 months ago
Downlink Limited Feedback Transmission Schemes for Asymmetric MIMO Channels
Abstract—In multiple-input multiple-output (MIMO) broadcast channels, multiuser diversity is exploited by scheduling data transmission to users with best channel conditions. To ï...
Mohsen Eslami, Witold A. Krzymien
77
Voted
CODES
2004
IEEE
15 years 2 months ago
Tuning SoC platforms for multimedia processing: identifying limits and tradeoffs
We present a analytical framework to identify the tradeoffs and performance impacts associated with different SoC platform configurations in the specific context of implementing m...
Alexander Maxiaguine, Yongxin Zhu, Samarjit Chakra...
ISCA
2003
IEEE
169views Hardware» more  ISCA 2003»
15 years 3 months ago
Virtual Simple Architecture (VISA): Exceeding the Complexity Limit in Safe Real-Time Systems
Meeting deadlines is a key requirement in safe realtime systems. Worst-case execution times (WCET) of tasks are needed for safe planning. Contemporary worst-case timing analysis t...
Aravindh Anantaraman, Kiran Seth, Kaustubh Patil, ...