نتایج جستجو برای: lateral slots

تعداد نتایج: 129838  

Journal: :Ad Hoc Networks 2016
Meng-Shiuan Pan Yi-Hsun Lee

Convergecast is a fundamental operation in many wireless sensor network (WSN) applications. To conserve energy, many previous WSN protocols discuss to periodically schedule active timings (or say slots) of transmission links in the network. When collecting data, the slots should be carefully assigned to conserve latency. Recently, the multichannel concept is utilized to facilitate slot assignme...

2015
Oren Ben-Zwi Monika Henzinger Veronika Loitzenbauer

Ad exchanges are an emerging platform for trading advertisement slots on the web with billions of dollars revenue per year. Every time a user visits a web page, the publisher of that web page can ask an ad exchange to auction off the ad slots on this page to determine which advertisements are shown at which price. Due to the high volume of traffic, ad networks typically act as mediators for ind...

1998
Don R. Hush

Radio Frequency Identiication (RFID) systems have emerged as a viable and aaordable alternative for tagging and/or labeling small to large quantities of items. The arbitration problem is that of identifying alìtags' present in the current environment (i.e reading the labels). This is a multiaccess communication problem in which contention for the communication medium is transient in nature. Imp...

Journal: :Transportation Science 2011
Niels A. H. Agatz Ann Melissa Campbell Moritz Fleischmann Martin W. P. Savelsbergh

Many e-tailers providing attended home delivery, especially e-grocers, offer narrow delivery time slots to ensure satisfactory customer service. The choice of delivery time slots has to balance marketing and operational considerations, which results in a complex planning problem. We study the problem of selecting the set of time slots to offer in each of the zip codes in a service region. The s...

2015
Minglei Shu Dongfeng Yuan Chongqing Zhang Yinglong Wang Changfang Chen

Targeting the medical monitoring applications of wireless body area networks (WBANs), a hybrid medium access control protocol using an interrupt mechanism (I-MAC) is proposed to improve the energy and time slot utilization efficiency and to meet the data delivery delay requirement at the same time. Unlike existing hybrid MAC protocols, a superframe structure with a longer length is adopted to a...

Journal: :Algorithms 2014
Changyong Jung Suk-Jin Lee Vijay Bhuse

We study the scheduling problem for data collection from sensor nodes to the sink node in wireless sensor networks, also referred to as the convergecast problem. The convergecast problem in general network topology has been proven to be NP-hard. In this paper, we propose our heuristic algorithm (finding the minimum scheduling time for convergecast (FMSTC)) for general network topology and evalu...

Journal: :Journal of Systems and Software 2018
Hyeongboo Baek Jinkyu Lee Insik Shin

The contention-free policy has received attention in real-time multiprocessor scheduling owing to its wide applicability and significant improvement in offline schedulability guarantees. Utilizing the notion of contention-free slots in which the number of active jobs is smaller than or equal to the number of processors, the policy improves the schedulability by offloading executions in contendi...

2010
Yanjun Zuo Xu Ma Long Qi Xinglong Liao

The flow field has significantly impact on seeding performance in the suction seeding device. A three-dimensional, incompressible, viscous, RNG turbulence model and the SIMPLE method were used by computational fluid dynamics(CFD), and the flow fields of suction cylinder-seeder with different socket’s radiuses were simulated by Fluent. When vacuum is 4kPa and productivity is 350 trays/h, the sim...

2016

Hash Tables A hash table is a data structure with the following operations: • INSERT(k, v): insert an item with key k and value v • SEARCH(k): searches the hash table for key k • DELETE(k): deletes key k from the hash table Goal is to have each of these operations in O(1) time. You can think of a hash table as a list of m slots. Inserting a key puts it in one of the slots in the hash table, del...

Journal: :Comput. J. 2014
Tien Dung Nguyen An Thuy Nguyen Man Doan Nguyen Nguyen Van Mui Eui-nam Huh

Virtual machine (VM) migration has recently emerged as a potential tool to improve the performance, cost and fault tolerance of data centers. However, migrating VMs requires more hardware resources to reserve target slots during the migration. A large number of simultaneous migrations can exhaust the physical resources of a data center. Consequently, the system may deny new service requests. In...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید