نتایج جستجو برای: cross layer

تعداد نتایج: 759868  

2006
Andrea J. Goldsmith Ahmad R. S. Bahai Sanjay Lall

In this thesis we consider wireless networks with a hard energy constraint, where each node is powered by a small battery. Under this hard constraint, reducing energy consumption is the most important design consideration for such networks. Since all layers of the protocol stack contribute to the energy per bit consumed in its end-to-end transmission, energy minimization requires a joint design...

2006
Yaling Yang

Advances in computing technology have resulted in high-end mobile devices with extensive computational capabilities that enable complex applications such as video encoding or lossless data compression. However, the energy requirements of such applications far exceed current battery technology, which is not improving as quickly as computing capabilities. Techniques have been designed targeting e...

2008
Andreas Jürgen Lachenmann

13 Deutsche Zusammenfassung 15 1. Einleitung . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 2. Schichtenübergreifender Datenaustausch . . . . . . . . . . . . . . . . . 17 3. Datenspeicherung in virtuellem Speicher . . . . . . . . . . . . . . . . . 20 4. Abstraktionen und Algorithmen für energiebewusste Anwendungen . . 22 5. Zusammenfassung und Ausblick . . . . . . . . . ...

2010
Nitin Salodkar Abhay Karandikar

Wireless channel poses significant challenges to resource management due to multipath fading. In this chapter, we review the impact of wireless channel on the design of scheduling algorithms at the link and network layers. It has been well recognized now that significant performance gains can be obtained by designing channel aware scheduling algorithms. Various scheduling schemes catering to di...

2002
Rajani Muraleedharan Lisa Ann Osadciw

Security and privacy plays a vital role in wireless applications such as health monitoring, military and biometric identification systems. Due to the limited resource constraints in wireless sensor network, security in protocols is sacrificed or kept minimal. In this paper, a cross layer protocol is designed to detect denial of service attack imposed on the network by malicious nodes. The Denia...

2014
Vikas Chandra Subhasish Mitra Chen-Yong Cher Silvia M. Müller

Resilience at different design hierarchies will be needed in Complex SoCs to handle failures due to variability, reliability and design errors (logical or electrical). The main reasons for the marginal behavior are sheer design complexity, uncertainties in manufacturing processes, temporal variability and operating conditions. In this session, we will cover the basics of cross layer resiliency ...

2010
Pantelis Angelidis

In recent years, personalised health is rapidly gaining momentum as a result of advances in various technological areas, prevailing amongst them the ICT domain. However, the new applications are still mostly a dream for the majority of the world population due to cost and infrastructure constraints. We present here initial findings of a low cost, low power, backbone free pHealth solution, suita...

2015
Yuenong Zhu

Wireless Sensor Networks (WSN) has drawn significant attention recently as a key important factor especially in sensitive areas, through which, data can be simply collected and transmitted. However, we lack practical WSN that promises a high-speed, real time and energy efficient communication with a small size cell battery. In this paper, we proposed a novel cross-layer Hybrid Automatic Repeat ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید