Sciweavers

PE
2008
Springer
109views Optimization» more  PE 2008»
13 years 4 months ago
A conditional probability approach to M/G/1-like queues
Following up on a recently renewed interest in computational methods for M/G/1-type processes, this paper considers an M/G/1-like system in which the service time distribution is ...
Alexandre Brandwajn, Hongyun Wang
PE
2008
Springer
102views Optimization» more  PE 2008»
13 years 4 months ago
Multipoint-to-point lightpaths in all-optical networks: Dimensioning and cost analysis
One of the major concerns in optical networks is the bandwidth underutilization problem. In fact, as WDM technology keeps maturing, there is a bandwidth gap between the transmissi...
Nizar Bouabdallah, Guy Pujolle, Harry G. Perros
PE
2008
Springer
91views Optimization» more  PE 2008»
13 years 4 months ago
The Foreground-Background queue: A survey
Computer systems researchers have begun to apply the Foreground-Background (FB) scheduling discipline to a variety of applications, and as a result, there has been a resurgence in...
Misja Nuyens, Adam Wierman
PE
2008
Springer
167views Optimization» more  PE 2008»
13 years 4 months ago
Analysis of ratings on trust inference in open environments
Ratings (also known as recommendations) provide an efficient and effective way to build trust relationship in the human society, by making use of the information from others rathe...
Zhengqiang Liang, Weisong Shi
PE
2008
Springer
114views Optimization» more  PE 2008»
13 years 4 months ago
An efficient technique to analyze the impact of bursty TCP traffic in wide-area networks
In this paper we describe an analytical technique for the performance evaluation of wide-area networks carrying realistic TCP traffic, such as that produced by a large number of f...
Michele Garetto, Donald F. Towsley
PE
2008
Springer
114views Optimization» more  PE 2008»
13 years 4 months ago
Buffer overflow asymptotics for multiplexed regulated traffic
By characterizing the worst case profile, which maximizes the content of a buffer fed with leaky bucket regulated flows in packet telecommunication networks, we derive a tight upp...
Yu Ying, Fabrice Guillemin, Ravi Mazumdar, Catheri...
PE
2008
Springer
139views Optimization» more  PE 2008»
13 years 4 months ago
Performance optimization of region-based group key management in mobile ad hoc networks
We propose and analyze a scalable and efficient region-based group key management protocol for secure group communications in mobile ad hoc networks. For scalability and dynamic r...
Jin-Hee Cho, Ing-Ray Chen, Ding-Chau Wang
PE
2008
Springer
143views Optimization» more  PE 2008»
13 years 4 months ago
Improving the performance of large interconnection networks using congestion-control mechanisms
As the size of parallel computers increases, as well as the number of sources per router node, congestion inside the interconnection network rises significantly. In such systems, ...
José Miguel-Alonso, Cruz Izu, José-&...
PE
2008
Springer
106views Optimization» more  PE 2008»
13 years 4 months ago
Heavy traffic analysis of polling models by mean value analysis
In this paper we present a new approach to derive heavy-traffic asymptotics for polling models. We consider the classical cyclic polling model with exhaustive or gated service at ...
Robert D. van der Mei, Erik M. M. Winands
PE
2008
Springer
87views Optimization» more  PE 2008»
13 years 4 months ago
Output analysis of multiclass fluid models with static priorities
Elena I. Tzenova, Ivo J. B. F. Adan, Vidyadhar G. ...