Sciweavers

790 search results - page 122 / 158
» Limits of Work-Stealing Scheduling
Sort
View
104
Voted
EMSOFT
2004
Springer
15 years 6 months ago
Loose synchronization of event-triggered networks for distribution of synchronous programs
Dataflow synchronous languages have attracted considerable interest in domains such as real-time control and hardware design. The potential benefits are promising: Discrete-time...
Jan Romberg, Andreas Bauer 0002
99
Voted
INFOCOM
2003
IEEE
15 years 5 months ago
An FDD Wideband CDMA MAC Protocol for Wireless Multimedia Networks
Abstract—A medium access control (MAC) protocol is developed for wireless multimedia networks based on frequency division duplex (FDD) wideband code division multiple access (CDM...
Xudong Wang
RTSS
2003
IEEE
15 years 5 months ago
A Dynamic Voltage Scaling Algorithm for Sporadic Tasks
Dynamic voltage scaling (DVS) algorithms save energy by scaling down the processor frequency when the processor is not fully loaded. Many algorithms have been proposed for periodi...
Ala' Qadi, Steve Goddard, Shane Farritor
ATAL
2003
Springer
15 years 5 months ago
Continual coordination through shared activities
Interacting agents that interleave planning and execution must reach consensus on their commitments to each other. In domains where agents have varying degrees of interaction and ...
Bradley J. Clement, Anthony C. Barrett
85
Voted
ACSAC
2002
IEEE
15 years 5 months ago
Voice over IPsec: Analysis and Solutions
In this paper we present the results of the experimental analysis of the transmission of voice over secure communication links implementing IPsec. Critical parameters characterizi...
Roberto Barbieri, Danilo Bruschi, Emilia Rosti