Sciweavers

948 search results - page 36 / 190
» Analysis of SITA policies
Sort
View
WSC
2008
15 years 3 days ago
Supply chain risks analysis by using jump-diffusion model
This paper investigates the effects of demand risk on the performance of supply chain in continuous time setting. The inventory level has been modeled as a jump-diffusion process ...
Xianzhe Chen, Jun Zhang
SIGMETRICS
2008
ACM
118views Hardware» more  SIGMETRICS 2008»
14 years 9 months ago
Finding the optimal quantum size: Sensitivity analysis of the M/G/1 round-robin queue
We consider the round robin (RR) scheduling policy where the server processes each job in its buffer for at most a fixed quantum, q, in a round-robin fashion. The processor sharin...
Varun Gupta
CDC
2008
IEEE
139views Control Systems» more  CDC 2008»
15 years 4 months ago
Human-in-the-loop vehicle routing policies for dynamic environments
— In this paper we design coordination policies for a routing problem requiring human-assisted classification of targets through analysis of information gathered on-site by auto...
Ketan Savla, Tom Temple, Emilio Frazzoli
RTAS
2010
IEEE
14 years 7 months ago
Timing Analysis for TDMA Arbitration in Resource Sharing Systems
Abstract--Modern computing systems have adopted multicore architectures and multiprocessor systems on chip (MPSoCs) for accommodating the increasing demand on computation power. Ho...
Andreas Schranzhofer, Jian-Jia Chen, Lothar Thiele
ICC
2007
IEEE
119views Communications» more  ICC 2007»
15 years 4 months ago
A Secure Authentication Policy for UMTS and WLAN Interworking
—We propose a security authentication policy, Dynamic Session Key Policy (DSKP), for a secure handoff between the UMTS and IEEE 802.11 WLAN. This policy is founded and improved f...
Yen-Chieh Ouyang, Chang-Bu Jang, Hung-Ta Chen