Sciweavers

1368 search results - page 68 / 274
» Modeling the Telephone Call Network
Sort
View
56
Voted
TCOM
2008
68views more  TCOM 2008»
15 years 20 days ago
Analysis and design of book-ahead bandwidth-sharing mechanisms
In this article, we present a novel discrete-time Markov chain model of book-ahead bandwidthsharing mechanisms. We use this analytical model and a simulation model to understand t...
Xiangfei Zhu, Malathi Veeraraghavan
FGCN
2007
IEEE
15 years 7 months ago
Supporting Deadline Monotonic Policy over 802.11 MAC Layer Service Time Distribution
In this paper, we propose a real time scheduling policy over 802.11 DCF protocol called Deadline Monotonic (DM). We evaluate the performance of this policy for a simple scenario w...
Inès El Korbi, Leïla Azouz Saïdan...
MEMOCODE
2005
IEEE
15 years 6 months ago
Extended abstract: a race-free hardware modeling language
We describe race-free properties of a hardware description language called GEZEL. The language describes networks of cycle-true finite-state-machines with datapaths (FSMDs). We de...
Patrick Schaumont, Sandeep K. Shukla, Ingrid Verba...
85
Voted
PERCOM
2006
ACM
16 years 10 days ago
Sentient Processes - Process-based Applications in Pervasive Computing
Users' tasks are typically a sequence of steps. Today, the goal of Pervasive Computing applications ? to support users in their tasks by using context information ? is only p...
Stephan Urbanski, Christian Becker, Kurt Rothermel
169
Voted
IHI
2012
217views Healthcare» more  IHI 2012»
13 years 8 months ago
Declarative privacy policy: finite models and attribute-based encryption
Regulations and policies regarding Electronic Health Information (EHI) are increasingly complex. Federal and State policy makers have called for both education to increase stakeho...
Peifung E. Lam, John C. Mitchell, Andre Scedrov, S...