We give a closed-form expression for the discounted weighted queue length and switching costs of a two-class single-server queueing model under a preemptive priority rule. These e...
A method to calculate numerically the multiplicity of a solution to a system of algebraic equations is presented. The method is an application of Zeuthen’s rule which gives the m...
The premises of this paper are 1) security is application dependent because application semantics directly influence proper protection; but 2) applications are generally too compl...
With continuous acceptance of World Wide Web (WWW) as a de facto standard for human-computer interaction and human-human communication, it is desirable to develop net-centric, mul...
Abdul S. Haji-Ismail, Min Chen, Phil W. Grant, Mar...
We present a new model for generating network applications. Our model is based on trees communicating with each other. Our model is simple to understand, but yet powerful enough to...