Sciweavers

3639 search results - page 565 / 728
» Provenance as Dependency Analysis
Sort
View
INFOCOM
2005
IEEE
15 years 6 months ago
On neighbor discovery in wireless networks with directional antennas
We consider the problem of neighbor discovery in static wireless ad hoc networks with directional antennas. We propose several probabilistic algorithms in which nodes perform rand...
Sudarshan Vasudevan, James F. Kurose, Donald F. To...
IPPS
2005
IEEE
15 years 6 months ago
A Compiler and Runtime Infrastructure for Automatic Program Distribution
This paper presents the design and the implementation of a compiler and runtime infrastructure for automatic program distribution. We are building a research infrastructure that e...
Roxana Diaconescu, Lei Wang, Zachary Mouri, Matt C...
109
Voted
IPPS
2005
IEEE
15 years 6 months ago
The Applicability of Adaptive Control Theory to QoS Design: Limitations and Solutions
Due to the increasing complexity, the behavior of large-scale distributed systems becomes difficult to predict. The ability of on-line identification and autotuning of adaptive co...
Keqiang Wu, David J. Lilja, Haowei Bai
94
Voted
ISCA
2005
IEEE
121views Hardware» more  ISCA 2005»
15 years 6 months ago
Direct Cache Access for High Bandwidth Network I/O
Recent I/O technologies such as PCI-Express and 10Gb Ethernet enable unprecedented levels of I/O bandwidths in mainstream platforms. However, in traditional architectures, memory ...
Ram Huggahalli, Ravi R. Iyer, Scott Tetrick
81
Voted
ISCAS
2005
IEEE
127views Hardware» more  ISCAS 2005»
15 years 6 months ago
Energy and latency evaluation of NoC topologies
Abstract — Mapping applications onto different networks-onchip (NoCs) topologies is done by mapping processing cores on local ports of routers considering requirements like laten...
Márcio Eduardo Kreutz, César A. M. M...