Sciweavers

PE
2006
Springer
125views Optimization» more  PE 2006»
13 years 4 months ago
Approximating multi-skill blocking systems by HyperExponential Decomposition
We consider multi-class blocking systems in which jobs require a single processing step. There are groups of servers that can each serve a different subset of all job classes. The...
Geert Jan Franx, Ger Koole, Auke Pot
PE
2006
Springer
85views Optimization» more  PE 2006»
13 years 4 months ago
Loss probability in a finite queue with service interruptions and queue length distribution in the corresponding infinite queue
In this paper, we consider a discrete-time finite-buffer queue with correlated arrivals and service interruptions and the corresponding infinite-buffer queue. Under some assumptio...
Fumio Ishizaki
PE
2006
Springer
114views Optimization» more  PE 2006»
13 years 4 months ago
On the performance of Internet worm scanning strategies
In recent years, fast spreading worms, such as Code Red, Slammer, Blaster and Sasser, have become one of the major threats to the security of the Internet. In order to defend agai...
Cliff Changchun Zou, Donald F. Towsley, Weibo Gong
PE
2006
Springer
80views Optimization» more  PE 2006»
13 years 4 months ago
Sojourn time approximations in queueing networks with feedback
Bart M. M. Gijsen, Robert D. van der Mei, P. Engel...
PE
2006
Springer
124views Optimization» more  PE 2006»
13 years 4 months ago
On priority queues with priority jumps
In this paper, we investigate a simplified head-of-the-line with priority jumps (HOL-PJ) scheduling discipline. Therefore, we consider a discrete-time single-server queueing syste...
Tom Maertens, Joris Walraevens, Herwig Bruneel
PE
2006
Springer
91views Optimization» more  PE 2006»
13 years 4 months ago
Performance of peer-to-peer networks: Service capacity and role of resource sharing policies
In this paper we model and study the performance of peer-to-peer (P2P) file sharing systems in terms of their `service capacity'. We identify two regimes of interest: the tra...
Xiangying Yang, Gustavo de Veciana
PE
2006
Springer
115views Optimization» more  PE 2006»
13 years 4 months ago
Optimal processor allocation to differentiated job flows
In this paper, we study the problem of dynamic allocation of the resources of a general parallel processing system, comprised of M heterogeneous processors and M heterogeneous tra...
Kimberly M. Wasserman, George Michailidis, Nichola...
PE
2006
Springer
193views Optimization» more  PE 2006»
13 years 4 months ago
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
PE
2006
Springer
127views Optimization» more  PE 2006»
13 years 4 months ago
Cycloid: A constant-degree and lookup-efficient P2P overlay network
There are many structured P2P systems that use DHT technologies to map data items onto the nodes in various ways for scalable routing and location. Most of the systems require O(lo...
Haiying Shen, Cheng-Zhong Xu, Guihai Chen
PE
2006
Springer
79views Optimization» more  PE 2006»
13 years 4 months ago
Parallel downloads for streaming applications - a resequencing analysis
Several recent studies have proposed methods to accelerate the receipt of a file by downloading its parts from different servers in parallel. The schemes suggested in most propose...
Yoav Nebat, Moshe Sidi