2010
DOI: 10.1155/2010/986192
|View full text |Cite
|
Sign up to set email alerts
|

Balanced Bipartite Graph Based Register Allocation for Network Processors in Mobile and Wireless Networks

Abstract: Mobile and wireless networks are the integrant infrastructure of mobile and pervasive computing that aims at providing transparent and preferred information and services for people anytime anywhere. In such environments, end-to-end network bandwidth is crucial to improve user's transparent experience when providing on-demand services such as mobile video playing. As a result, powerful computing power is required for networked nodes, especially for routers. General-purpose processors cannot meet such requiremen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2011
2011
2012
2012

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 38 publications
0
3
0
Order By: Relevance
“…Recently, researchers proposed many scatternet formation algorithms which can be roughly divided into three categories: tree-based algorithms [10][11][12][13], ring-based algorithms [14][15][16] and mesh-based algorithms [17][18][19][20][21][22].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Recently, researchers proposed many scatternet formation algorithms which can be roughly divided into three categories: tree-based algorithms [10][11][12][13], ring-based algorithms [14][15][16] and mesh-based algorithms [17][18][19][20][21][22].…”
Section: Related Workmentioning
confidence: 99%
“…Rashid Bin Muhammad [11] proposed a method for range assignment problem on the Steiner tree based topology, but the method should throw away nodes that are too far from neighbor nodes which lead to too many dense nodes for the connectivity. Tang et al [12] proposed a tree-based heuristic algorithm for mobile and pervasive computing based on special network processors. Saginbekov et al [13] also proposed a tree-based shortest path algorithm, trying to realize the energy saving through minimizing the energy consumption during communication.…”
Section: Related Workmentioning
confidence: 99%
“…And the scheme in [21] even support NOT gate. To our knowledge, most ABS schemes cannot simultaneously implement an expressive policy and construct the security in standard model, that is, Diffie-Hellman assumptions, which are as famous as Diffie-Hellman key based methods used in [27,28] to improve the security of wireless networks, in which other techniques, such as register allocation method [29], MISP protocol [30], and SVO logic [31], have been utilized too.…”
Section: Introductionmentioning
confidence: 99%