Sciweavers

964 search results - page 88 / 193
» Performance Limitations of ADSL Users: A Case Study
Sort
View
COOP
2004
15 years 3 months ago
Model Checking Groupware Protocols
Abstract. The enormous improvements in the efficiency of model-checking techniques in recent years facilitates their application to ever more complex systems of concurrent and dist...
Maurice H. ter Beek, Mieke Massink, Diego Latella,...
ITC
2003
IEEE
197views Hardware» more  ITC 2003»
15 years 6 months ago
Critical Timing Analysis in Microprocessors Using Near-IR Laser Assisted Device Alteration (LADA)
A scalable laser-based timing analysis technique we call laser assisted device alteration (LADA) is introduced for the rapid isolation and analysis of defect-free performance limi...
Jeremy A. Rowlette, Travis M. Eiles
RTCSA
2008
IEEE
15 years 8 months ago
Real-Time Communications Over Cluster-Tree Sensor Networks with Mobile Sink Behaviour
· Modelling the fundamental performance limits of Wireless Sensor Networks (WSNs) is of paramount importance to understand the behaviour of WSN under worst-case conditions and to...
Petr Jurcík, Ricardo Severino, Anis Koubaa,...
INFOCOM
2006
IEEE
15 years 7 months ago
TWINE: A Hybrid Emulation Testbed for Wireless Networks and Applications
In this paper, we present a high fidelity and efficient emulation framework called TWINE, which combines the accuracy and realism of emulated and physical networks and the scala...
Junlan Zhou, Zhengrong Ji, Rajive Bagrodia
CNSR
2005
IEEE
15 years 7 months ago
Third-Party Flow Control
Flow control is critical to the efficient operation of Internet Service Providers network equipment. In particular, the ability to effectively shape traffic can reduce cost and ...
Dushyant Bansal, Paul A. S. Ward