Now showing items 182-201 of 262

  • Performance of LRU block replacement algorithm with pre-fetching 

    Pendse, Ravi; Bhagavathula, Ravi (IEEE, 1998-08-09)
    An economical solution to the need for unlimited amounts of fast memory is a memory hierarchy, which takes advantage of locality and cost/performance of memory technologies. Most of the advanced block replacement algorithms ...
  • Performance of LRU-FP block replacement algorithm with pre-fetching 

    Pendse, Ravi; Katta, H.; Rajmoni, R. (International Society for Computers and Their Applications, 1999-11)
  • Phase synchronization for distributed sensor networks in feedback bit errors 

    Wu, Haijie; Ding, Yanwu; Kwon, Hyuck M. (IEEE, 2010-06-25)
    It has been reported recently that phase synchronization in distributed sensor networks can be achieved by adjusting the phase in sensors randomly with a single bit feedback from the receiver (base station) to the sensors. ...
  • PHY-supported frame aggregation for wireless local area networks 

    Shin, Cheolkyu; Park, Hyuncheol; Kwon, Hyuck M. (IEEE, 2014-10)
    An aggregate medium access control (MAC) service data unit (A-MSDU) contains multiple subframes with a single sequence number. Hence, it has a major drawback in environments with high error rates because if any subframes ...
  • Pipeline LRU block replacement algorithm 

    Bhagavathula, Ravi; Chittoor, P.; Pendse, Ravi (IEEE, 2000)
    Recent advances in VLSI technology have spurred a tremendous increase in the performance of processors. Due to the slower main memory, there exists a bottleneck in the performance of computer systems. Caching is an effective ...
  • Pole placement using projective controls and LQ modification 

    Arar, A. S.; Sawan, M. Edwin (IEEE, 1991-06-26)
    A method for solving the output regulator problem by using projective controls was reported by Medanic. Using this method reigenvalues of the state feedback closed-loop system can be retained where r is the number of the ...
  • Port address translation based route optimization for mobile IP 

    Badami, D.; Thanthry, Nagaraja; Best, Patricia K.; Bhagavathula, Ravi; Pendse, Ravi (IEEE, 2004-09-06)
    The current mobility management protocol mobile IP (MIP) specifies the use of a home agent (HA) in forwarding datagrams to/from the mobile node (MN). This often leads to the usage of either triangular routing or reverse ...
  • Power allocation for AF relaying network under channel phase misalignment 

    Lee, Kanghee; Kwon, Hyuck M.; Yang, Jie; Sawan, M. Edwin; Park, Hyuncheol; Lee, Yong H. (IEEE, 2013)
    This paper studies both cooperative and noncooperative amplify-and-forward (AF) wireless relay strategies with power constraints at the source and at the relays. The main objective is to design jointly and iteratively the ...
  • Power and performance analysis of multimedia applications running on low-power devices by cache modeling 

    Asaduzzaman, Abu; Gunasekara, Govipalagodage H. (Springer, Part of Springer Science+Business Media, 2014-09)
    High processing speed is required to support computation intensive applications. Cache memory is used to improve processing speed by reducing the speed gap between the fast processing core and slow main memory. However, ...
  • Pre-fetching with the segmented LRU algorithm 

    Pendse, Ravi; Bhagavathula, Ravi (IEEE, 1999)
    An economical solution to the need for unlimited amounts of fast memory is a memory hierarchy, which takes advantage of locality and cost/performance of memory technologies. Most of the advanced block replacement algorithms ...
  • Privacy of community pseudonyms in wireless peer-to-peer networks 

    Freudiger, Julien; Jadliwala, Murtuza Shabbir; Hubaux, Jean-Pierre; Niemi, Valtteri; Ginzboorg, Philip (SPRINGER, 2013-06)
    Wireless networks offer novel means to enhance social interactions. In particular, peer-to-peer wireless communications enable direct and real-time interaction with nearby devices and communities and could extend current ...
  • Privacy-preserving optimal meeting location determination on mobile devices 

    Bilogrevic, Igor; Jadliwala, Murtuza Shabbir; Joneja, Vishal; Kalkan, Kubra; Hubaux, Jean-Pierre; Aad, Imad (IEEE, 2014-07)
    Equipped with state-of-the-art smartphones and mobile devices, today's highly interconnected urban population is increasingly dependent on these gadgets to organize and plan their daily lives. These applications often rely ...
  • Propagator method for joint time delay and frequency estimation 

    Qasaymeh, M.M.; Hiren, G.; Tayem, N.; Pendse, Ravi; Sawan, M. Edwin (IEEE, 2008-10-26)
    A novel method of estimating the differential delay of a sinusoidal signal is considered. The new method utilizes the propagator method (PM) which does not require the eigen-decomposition of the cross-spectral matrix (CSM) ...
  • Pulsed ferrite magnetic field generator for through-the-earth communication systems for disaster situation in mines 

    Bae, Seok; Hong, Yang-Ki; Lee, Jaejin; Park, Jihoon; Jalli, Jeevan; Abo, Gavin S.; Kwon, Hyuck M.; Jayasooriya, Chandana K. K. (Korean Magnetics Society, 2013-03)
    A pulsed ferrite magnetic field generator (FMFG) was designed for the use in the 1000 m long through-theearth (TTE) communication system for mining disaster situations. To miniaturize the TTE system, a ferrite core having ...
  • A QoS-based broadcast protocol under blind information for multihop cognitive radio ad hoc networks 

    Song, Yi; Xie, Jiang (IEEE, 2014-03)
    Broadcasting is an important operation in wireless networks where control information is usually propagated as broadcasts for the realization of most networking protocols. In traditional ad hoc networks, broadcasts are ...
  • Quantitative analysis of enhanced mobile IP 

    Best, Patricia K.; Pendse, Ravi (2006-06)
    As the popularity of mobile computing grows, the associated protocols and their scalability are subject to much closer scrutiny. Mobile IP relies heavily on the use of IP-to-IP tunneling, requiring 20 bytes of overhead ...
  • Quantitative analysis of security protocols in wireless networks 

    Best, Patricia K.; Namuduri, Kameswara; Pendse, Ravi (IEEE, 2003-06-18)
    Security has been a major concern for computer networks, and required levels of security continue to increase and become more complicated to provide. Wireless devices face new challenges in securely exchanging information ...
  • Quantizing the throughput reduction of IPSec with mobile IP 

    Khatavkar, D.; Hixon, E.R.; Pendse, Ravi (IEEE, 2002-08-04)
    The demand for immediate and universal access to information is increasing rapidly, leading to the desire for mobile access to the Internet. The Mobile Internet Protocol (Mobile IP) provides mobility to Internet users with ...
  • Radiographic screen film combination: an image analysis 

    Karim, M.A.; Pendse, Ravi (1984-10)
  • Rank revealing QR factorization for jointly time delay and frequency estimation 

    Qasaymeh, M.M.; Hiren, G.; Nizar, T.; Pendse, Ravi; Sawan, M. Edwin (IEEE, 2009-04-26)
    The rank-revealing QR factorization (RRQR) is a valuable tool in numerical linear algebra because it provides accurate information about rank and numerical null-space. In this paper, we addressed the problem of estimating ...