Sciweavers

PE
2006
Springer
193views Optimization» more  PE 2006»
14 years 9 months ago
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
PE
2006
Springer
158views Optimization» more  PE 2006»
14 years 9 months ago
Performance evaluation of multiple-rate mobile ad hoc networks
Existing wireless networks usually provide multiple data transmission rates. This paper presents a simulation study on the performance of multiple-rate mobile ad hoc networks (MAN...
Gang Ding, Xiaoxin Wu, Bharat K. Bhargava
PE
2006
Springer
145views Optimization» more  PE 2006»
14 years 9 months ago
Closed form solutions for mapping general distributions to quasi-minimal PH distributions
Approximating general distributions by phase-type (PH) distributions is a popular technique in stochastic analysis, since the Markovian property of PH distributions often allows a...
Takayuki Osogami, Mor Harchol-Balter
PE
2006
Springer
130views Optimization» more  PE 2006»
14 years 9 months ago
Analysis of manufacturing blocking systems with Network Calculus
In this paper, the manufacturing blocking system (MBS) is studied from the Network Calculus (NetCal) perspective. By dominating an MBS by a window flow controller (WFC), we obtain...
Amit Bose, Xiaoyue Jiang, Bin Liu, Gang Li
PE
2006
Springer
130views Optimization» more  PE 2006»
14 years 9 months ago
Analysis of resource transfers in peer-to-peer file sharing applications using fluid models
This paper proposes a stochastic fluid flow model to compute the transfer time distribution of resources in peer-to-peer file sharing applications. The amount of bytes transferred...
Rossano Gaeta, Marco Gribaudo, Daniele Manini, Mat...
Optimization
Top of PageReset Settings