Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,689,932 papers from all fields of science
Search
Sign In
Create Free Account
Overhead (computing)
Known as:
Computational overhead
, Overhead
In computer science, overhead is any combination of excess or indirect computation time, memory, bandwidth, or other resources that are required to…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
33 relations
Algorithm
Algorithmic efficiency
BareMetal
Block (data storage)
Expand
Broader (1)
Software engineering
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
An efficient tag search protocol in large-scale RFID systems
Min Chen
,
Wen Luo
,
Zhen Mo
,
Shigang Chen
,
Yuguang Fang
Proceedings IEEE INFOCOM
2016
Corpus ID: 52863978
Radio frequency identification (RFID) technology has many applications in inventory management, supply chain, product tracking…
Expand
Highly Cited
2008
Highly Cited
2008
A Lightweight NEMO Protocol to Support 6LoWPAN
Jin Ho Kim
,
C. Hong
,
Taeshik Shon
2008
Corpus ID: 61102011
The Network Mobility (NEMO) and IPv6 over Low power WPAN (6LoWPAN) protocols are the two most important technologies in current…
Expand
Highly Cited
2007
Highly Cited
2007
System architecture and cross-layer optimization of video broadcast over WiMAX
Jianfeng Wang
,
M. Venkatachalam
,
Yuguang Fang
IEEE Journal on Selected Areas in Communications
2007
Corpus ID: 9747208
Video broadcast and mobile TV have received significant interests from both academia and industry recently. The emerging mobile…
Expand
Highly Cited
2003
Highly Cited
2003
Dynamic Address Configuration in Mobile Ad hoc Networks
Yuan Sun
,
E. Belding-Royer
2003
Corpus ID: 14697896
The majority of routing protocols for ad hoc networks assume that mobile nodes are configured a priori with unique IP addresses…
Expand
Highly Cited
2002
Highly Cited
2002
A network architecture for MPLS-based micro-mobility
F. Chiussi
,
D. A. Khotimsky
,
S. Krishnan
IEEE Wireless Communications and Networking…
2002
Corpus ID: 16856190
Current mobile networks provide link-layer mobility as a mobile host changes its point of attachment within the scope of an…
Expand
Highly Cited
2001
Highly Cited
2001
Forming Scatternets from Bluetooth Personal Area Networks
Godfrey Tan
,
Allen K. L. Miu
,
J. Guttag
,
H. Balakrishnan
2001
Corpus ID: 7366859
There is increasing interest in wireless ad hoc networks built from portable devices equipped with short-range wireless network…
Expand
Highly Cited
1997
Highly Cited
1997
Efficient context-based entropy coding for lossy wavelet image compression
C. Chrysafis
,
Antonio Ortega
Proceedings DCC '97. Data Compression Conference
1997
Corpus ID: 845706
We present an adaptive image coding algorithm based on novel backward-adaptive quantization/classification techniques. We use a…
Expand
Highly Cited
1993
Highly Cited
1993
Concurrent error detection and fault-tolerance in linear analog circuits using continuous checksums
A. Chatterjee
IEEE Transactions on Very Large Scale Integration…
1993
Corpus ID: 32756165
The problem of concurrent error detection and fault tolerance is studied. These checksums of time-varying functions are possible…
Expand
Review
1993
Review
1993
Mint Tutorial and User Manual
J. Veenstra
1993
Corpus ID: 56908579
This document describes Mint, a MIPS code interpreter for parallel programs. Mint generates memory reference traces that can be…
Expand
Highly Cited
1987
Highly Cited
1987
BTC Image Coding Using Vector Quantization
V. Udpikar
,
J. P. Raina
IEEE Transactions on Communications
1987
Corpus ID: 206638249
This paper describes source encoding of the outputs of a block truncation coder (BTC), namely, the overhead statistical…
Expand