Network, web, and disk I/O traffic are usually bursty, self-similar [9, 3, 5, 6] and therefore can not be modeled adequately with Poisson arrivals[9]. However, we do want to model...
Mengzhi Wang, Ngai Hang Chan, Spiros Papadimitriou...
Recent advances in mobile and wireless technologies make possible the bear of new services and the extension of traditional ones in new scenarios. Adaptation strategies play a cru...
Domenico Cotroneo, Generoso Paolillo, C. Pirro, St...
Though traditional Ethernet based network architectures such as Gigabit Ethernet have suffered from a huge performance difference as compared to other high performance networks (e...
Wu-chun Feng, Pavan Balaji, C. Baron, Laxmi N. Bhu...
Embedded systems have become prevalent in today’s computing world and more and more of these embedded systems are highly distributed and network centric. This adds increasing deg...
This paper considers the use of software mobile agents as proxy agents, to provide seamless mobility and cater for heterogeneous devices and network characteristics. We specificall...