Sciweavers

17450 search results - page 239 / 3490
» Numerical Methods with Applications
Sort
View
QUESTA
2000
56views more  QUESTA 2000»
15 years 3 months ago
On the value function of a priority queue with an application to a controlled polling model
We give a closed-form expression for the discounted weighted queue length and switching costs of a two-class single-server queueing model under a preemptive priority rule. These e...
Ger Koole, Philippe Nain

Publication
453views
17 years 2 months ago
System Level Modeling of IEEE 802.16e Mobile WiMAX Networks: Key Issues
WiMAX has attracted a lot of attention recently in the telecommunication community including researchers, product developers and service providers. Numerous papers have been publis...
Raj Jain, Chakchai So-In, and Abdel-Karim Al Tamim...
ACMSE
2009
ACM
15 years 10 months ago
Bit vector algorithms enabling high-speed and memory-efficient firewall blacklisting
In a world of increasing Internet connectivity coupled with increasing computer security risks, security conscious network applications implementing blacklisting technology are be...
J. Lane Thames, Randal Abler, David Keeling
KDD
2005
ACM
107views Data Mining» more  KDD 2005»
15 years 9 months ago
Cross-relational clustering with user's guidance
Clustering is an essential data mining task with numerous applications. However, data in most real-life applications are high-dimensional in nature, and the related information of...
Xiaoxin Yin, Jiawei Han, Philip S. Yu
139
Voted
TWC
2008
99views more  TWC 2008»
15 years 3 months ago
Cross layer dynamic resource allocation with targeted throughput for WCDMA data
We consider resource allocation for elastic wireless applications that measure utility by target connection average throughput and achieved throughput. We construct a framework for...
Peifang Zhang, Scott Jordan