Inherent to the wireless sensor networks are the two major problems of the broadcasting vulnerability, the limited computational capability and power budget. Even though security ...
We investigate the statistical properties of both originated and terminated call arrivals in sets of real GSM telephone traffic data (TIM, Italy), emphasizing results obtained ...
Abstract--In this paper, we investigate possible timecorrelation of answered call arrivals in sets of real GSM telephone traffic data. Instead of attempting to model the empirical ...
Multimedia traffic and real-time e-commerce applications can experience quality degradation in traditional networks such as the Internet. These difficulties can be overcome in n...
This paper introduces the Critical Channel Traversing (CCTJ algorithm, a new scheduling algorithm for both sequential and parallel discrete event simulation. CCT is a general cons...
Xiao Zhonge, Brian Unger, Rob Simmonds, John G. Cl...