Results 1 - 10
of
709
High Speed Switch Scheduling for Local Area Networks
- ACM Transactions on Computer Systems
, 1993
"... Current technology trends make it possible to build communication networks that can support high performance distributed computing. This paper describes issues in the design of a prototype switch for an arbitrary topology point-to-point network with link speeds of up to one gigabit per second. The s ..."
Abstract
-
Cited by 246 (3 self)
- Add to MetaCart
. The switch deals in fixed-length ATM-style cells, which it can process at a rate of 37 million cells per second. It provides high bandwidth and low latency for datagram traffic. In addition, it supports real-time traffic by providing bandwidth reservations with guaranteed latency bounds. The key
RECYCLING THE UNUSED BANDWIDTH USING PRIORITY BASED SCHEDULING ALGORITHM
"... IEEE802.16 standard was designed to support the bandwidth demanding applications with quality of service (QOS). Bandwidth is reserved for each application to ensure the QOS for variable bit rate (VBR) applications, however it is difficult for the subscriber station (SS) to predict the amount of inco ..."
Abstract
- Add to MetaCart
of incoming data. To ensure the QOS guaranteed services, the SS may reserve more bandwidth than its demand. As a result, the reserved bandwidth may not be fully utilized all the time. In this paper we propose a scheme named bandwidth recycling to recycle the unused bandwidth without changing the existing
A static power model for architects
- In Proceedings of the 33rd International Symposium on Microarchitecture (MICRO-33
, 2000
"... Static power dissipation due to transistor leakage constitutes an increasing fraction of the total power in modern semiconductor technologies. Current technology trends indicate that the contribution will increase rapidly, reaching one half of total power dissipation within three process generations ..."
Abstract
-
Cited by 177 (2 self)
- Add to MetaCart
supply voltages or slower, less leaky transistors, turning off unused devices, favoring certain design styles, and favoring high bandwidth over low latency. Speculation is also examined as a means to employ slower transistors without a significant performance penalty. 1.
A Bandwidth Sharing Approach to Improve Licensed Spectrum Utilization
- IEEE COMMUNICATIONS
, 2005
"... The spectrum of deployed wireless cellular communication systems is found to be underutilized, even though licensed spectrum is at a premium. To efficiently utilize the bandwidth left unused in a cellular system, the primary system (PRI), we propose an overlaid ad hoc secondary network (ASN) archite ..."
Abstract
-
Cited by 85 (0 self)
- Add to MetaCart
The spectrum of deployed wireless cellular communication systems is found to be underutilized, even though licensed spectrum is at a premium. To efficiently utilize the bandwidth left unused in a cellular system, the primary system (PRI), we propose an overlaid ad hoc secondary network (ASN
On Bandwidth Smoothing
- In 4th International Web Caching Workshop
, 1999
"... The bandwidth usage due to HTTP traffic often varies considerably over the course of a day, requiring high network performance during peak periods while leaving network resources unused during off-peak periods. We show that using these extra network resources to prefetch web content during off-peak ..."
Abstract
-
Cited by 21 (1 self)
- Add to MetaCart
The bandwidth usage due to HTTP traffic often varies considerably over the course of a day, requiring high network performance during peak periods while leaving network resources unused during off-peak periods. We show that using these extra network resources to prefetch web content during off
QoS-aware routing based on bandwidth estimation for mobile ad hoc networks
- IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS
, 2005
"... Routing protocols for mobile ad hoc networks (MANETs) have been explored extensively in recent years. Much of this work is targeted at finding a feasible route from a source to a destination without considering current network traffic or application requirements. Therefore, the network may easily b ..."
Abstract
-
Cited by 104 (3 self)
- Add to MetaCart
S requirements of real-time applications. The novel part of this QoS-aware routing protocol is the use of the approximate bandwidth estimation to react to network traffic. Our approach implements these schemes by using two bandwidth estimation methods to find the residual bandwidth available at each node
IMPACT PREDICTION OF THE REACTIVATION OF AN UNUSED TAILINGS DAM
"... A frequent occurrence in areas with a long history of mining is the reactivation of mine residue deposits. This paper presents an impact prediction study conducted for the reactivation of a gold tailings dam. Two phases of new tailings deposition are proposed. The objective of the study was to asses ..."
Abstract
- Add to MetaCart
A frequent occurrence in areas with a long history of mining is the reactivation of mine residue deposits. This paper presents an impact prediction study conducted for the reactivation of a gold tailings dam. Two phases of new tailings deposition are proposed. The objective of the study
Routing High-bandwidth Traffic in Max-min Fair Share Networks
"... We study how to improve the throughput of high-bandwidth traffic such as large file transfers in a network where resources are fairly shared among connections. While it is possible to devise priority or reservation-based schemes that give high-bandwidth traffic preferential treatment at the expense ..."
Abstract
-
Cited by 68 (6 self)
- Add to MetaCart
better than the minimal-hop routing and shortest-widest path routing algorithms. To further improve throughput without reducing the fair share of single-path connections, we propose a novel prioritized multi-path routing algorithm in which low priority paths share the bandwidth left unused by higher
Residual Energy Scans for Monitoring Wireless Sensor Networks
- IN PROCEEDINGS OF THE IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE
, 2001
"... It is important to have continuously updated information about network resources and application activities after a wireless sensor network is deployed in unpredictable environment. Such information can help notify users of resource depletion or abnormal activities. However, the low user-to-node r ..."
Abstract
-
Cited by 78 (8 self)
- Add to MetaCart
-to-node ratio and limited energy and bandwidth resources in sensor networks make extracting states from each individual node infeasible. In this paper, we propose an approach to construct abstracted scans of sensor network health by applying in-network aggregation of network states. Specifically, we design a
Courtesy piggybacking: Supporting differentiated services in multiop mobile ad hoc networks
- IEEE Transactions on Mobile Computing
, 2004
"... Abstract—Due to the salient characteristics such as the time-varying and error-prone wireless links, the dynamic and limited bandwidth, the time-varying traffic pattern and user locations, and the energy constraints, it is a challenging task to efficiently support heterogeneous traffic with differen ..."
Abstract
-
Cited by 12 (0 self)
- Add to MetaCart
residual bandwidth with courtesy. Another noteworthy feature of the proposed scheme is its implementation simplicity: The scheme is easy to implement and is applicable in networks using either reservation-based or contention-based MAC protocols. Index Terms—Differentiated services, quality of service
Results 1 - 10
of
709