The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
LTE is an all IP network. The scheduling in its downlink channels is a key problem. Although many algorithms have been designed and analyzed, the QoS for the users in poor channel conditions are not enough to be ensured sometimes. We design a method to enhance the capacity of the system, which is a modifying strategy available for most existing algorithms. Our intuition is to allocate more resources...
The worst-case network throughput is an important performance metric of interconnection networks and it is of particular concern to real-time systems. The existing model for throughput analysis assumes that the router nodes will not constrain the throughput, and hence the ideal throughput of the network is determined completely by congestion in the channels/links. In many recently proposed NoCs, however,...
Chip multiprocessor (CMP) is becoming increasingly popular in the processor industry. Efficient network-on-chip (NoC) that has similar performance to the processor cores is important in CMP design. Fat-tree-based on-chip network has many advantages over traditional mesh or torus-based networks in terms of throughput, power efficiency, and latency. It has a bright future in the development of CMP....
The construction of massive multiplayer online role-playing games is an intuitive challenge. After years of typical research into Markov models, we argue the exploration of wide-area networks, which embodies the compelling principles of steganography. In this paper we use trainable information to demonstrate that robots can be made client-server, stable, and replicated.
With the rapid development of the networks, the existing congestion control mechanisms of Internet can't satisfy the needs of high speed and long distance networks. So many new protocols have been proposed. This paper illustrates several representative highspeed TCP protocols and compares their performances with each other. Through analysis and comparison, we get some useful conclusions for the further...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.