Sciweavers

748 search results - page 57 / 150
» Time and Probability in Process Algebra
Sort
View
ICNP
2007
IEEE
15 years 6 months ago
Network Court Protocol and Malicious Node Conviction
- A Network Court Protocol is designed for malicious node conviction based on information from network node accusing and testifying operations, which are formally modeled by algebr...
Na Li, David Lee
MODELS
2007
Springer
15 years 6 months ago
Scenario Integration via the Transformation and Manipulation of Higher-order Graphs
The integration of different models, such as scenarios, is an important component of the requirements engineer’s work. If manually performed, the integration operation is error-...
Hongzhi Liang
83
Voted
CORR
2008
Springer
99views Education» more  CORR 2008»
15 years 16 days ago
Perturbation analysis of an M/M/1 queue in a diffusion random environment
Abstract. We study in this paper an M/M/1 queue whose server rate depends upon the state of an independent Ornstein-Uhlenbeck diffusion process (X(t)) so that its value at time t i...
Christine Fricker, Fabrice Guillemin, Philippe Rob...
SIGMETRICS
2006
ACM
116views Hardware» more  SIGMETRICS 2006»
15 years 6 months ago
The Erlang model with non-poisson call arrivals
The Erlang formula is known to be insensitive to the holding time distribution beyond the mean. While calls are generally assumed to arrive as a Poisson process, we prove that it ...
Thomas Bonald
PE
2002
Springer
128views Optimization» more  PE 2002»
15 years 3 days ago
Response times in a two-node queueing network with feedback
The study presented in this paper is motivated by the performance analysis of response times in distributed information systems, where transactions are handled by iterative server...
Robert D. van der Mei, Bart Gijsen, N. in't Veld, ...