Sciweavers

175 search results - page 5 / 35
» Password policy simulation and analysis
Sort
View
JSS
2010
142views more  JSS 2010»
13 years 1 months ago
Analysis of service availability for time-triggered rejuvenation policies
In this paper we investigate the effect of three time-triggered system rejuvenation policies on service availability using a queuing model. The model is formulated as an extended ...
Felix Salfner, Katinka Wolter
TCOM
2010
115views more  TCOM 2010»
13 years 5 months ago
QoS Analysis of a Scheduling Policy for Heterogeneous Users Employing AMC Jointly with ARQ
—This paper analyzes the quality of service (QoS) of scheduling algorithms for heterogeneous users in multiuser (MU) wireless systems that take advantage from a crosslayer design...
Mario Poggioni, Luca Rugini, Paolo Banelli
WSC
2008
13 years 9 months ago
Supply chain risks analysis by using jump-diffusion model
This paper investigates the effects of demand risk on the performance of supply chain in continuous time setting. The inventory level has been modeled as a jump-diffusion process ...
Xianzhe Chen, Jun Zhang
PE
2010
Springer
114views Optimization» more  PE 2010»
13 years 5 months ago
Analysis of scheduling policies under correlated job sizes
Correlations in traffic patterns are an important facet of the workloads faced by real systems, and one that has far-reaching consequences on the performance and optimization of t...
Varun Gupta, Michelle Burroughs, Mor Harchol-Balte...
GLOBECOM
2007
IEEE
14 years 1 months ago
Graph Theoretical Analysis of Opportunistic Scheduling Policy for Wireless Ad Hoc Networks
— 1 Taking advantage of the independent fading channel conditions among multiple wireless users, opportunistic transmissions schedule the user with the instantaneously best condi...
Qing Chen, Fei Ye, Zhisheng Niu