Sciweavers

790 search results - page 66 / 158
» Limits of Work-Stealing Scheduling
Sort
View
TWC
2008
87views more  TWC 2008»
15 years 15 days ago
A token-based scheduling scheme for WLANs supporting voice/data traffic and its performance analysis
Most of the existing medium access control (MAC) protocols for wireless local area networks (WLANs) provide prioritized access by adjusting the contention window sizes or interfram...
Ping Wang, Weihua Zhuang
96
Voted
PE
2010
Springer
91views Optimization» more  PE 2010»
14 years 11 months ago
Optimal server scheduling in hybrid P2P networks
We consider the server scheduling problem in hybrid P2P networks in the context of a fluid model. Specifically, we examine how to allocate the limited amount of server upload ca...
Bo Zhang, Sem C. Borst, Martin I. Reiman
89
Voted
INFOCOM
2007
IEEE
15 years 7 months ago
Target-Oriented Scheduling in Directional Sensor Networks
— Unlike convectional omni-directional sensors that always have an omni-angle of sensing range, directional sensors may have a limited angle of sensing range due to technical con...
Yanli Cai, Wei Lou, Minglu Li, X.-Y. Li
LCN
2003
IEEE
15 years 5 months ago
Scheduling Nodes in Wireless Sensor Networks: A Voronoi Approach
A wireless sensor network is a special kind of ad-hoc network with distributed sensing and processing capability that can be used in a wide range of applications, such as environm...
Marcos Augusto M. Vieira, Luiz Filipe M. Vieira, L...
IEEEPACT
1998
IEEE
15 years 4 months ago
A New Heuristic for Scheduling Parallel Programs on Multiprocessor
In this paper, we present an efficient algorithm, called CASS-II, for task clustering without task duplication. Unlike the DSC algorithm, which is empirically the best known algor...
Jing-Chiou Liou, Michael A. Palis