In this paper we present a new approach to derive heavy-traffic asymptotics for polling models. We consider the classical cyclic polling model with exhaustive or gated service at ...
Most research on QoS-aware computing considers systems where code is generally partitioned into separately schedulable tasks with associated timing constraints. In sharp contrast ...
Ronghua Zhang, Tarek F. Abdelzaher, John A. Stanko...
Signature-based tools such as network intrusion detection systems are widely used to protect critical systems. Automatic signature generation techniques are needed to enable these...
David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong...
In this paper we present a scalable model of a network of Active Queue Management (AQM) routers serving a large population of TCP flows. We present efficient solution techniques...
Yong Liu, Francesco Lo Presti, Vishal Misra, Donal...
Abstract—In multi-user multiple-input multiple-output (MUMIMO) systems, channel state information at the transmitter (CSIT) allows for multi-user spatial multiplexing and thus in...
Florian Kaltenberger, David Gesbert, Raymond Knopp...