Sciweavers

342 search results - page 40 / 69
» queue 2008
Sort
View
WSC
2008
13 years 10 months ago
Identifying significant factors affecting Request For Information (RFI) process time
The research is to illustrate how to identify the significant factor(s) affecting the Request For Information (RFI) process cycle time in the context of queueing behavior. Among t...
Chang-sun Chin, Jeffrey S. Russell
CN
2008
84views more  CN 2008»
13 years 8 months ago
A router-based technique to mitigate reduction of quality (RoQ) attacks
We propose a router-based technique to mitigate the stealthy reduction of quality (RoQ) attacks at the routers in the Internet. The RoQ attacks have been shown to impair the QoS s...
Amey Shevtekar, Nirwan Ansari
TOMACS
2010
182views more  TOMACS 2010»
13 years 6 months ago
State-dependent importance sampling for a Jackson tandem network
This paper considers importance sampling as a tool for rare-event simulation. The focus is on estimating the probability of overflow in the downstream queue of a Jacksonian two-n...
Denis I. Miretskiy, Werner R. W. Scheinhardt, Mich...
ANOR
2008
75views more  ANOR 2008»
13 years 8 months ago
Geometric decay in level-expanding QBD models
Level-expanding quasi-birth-and-death (QBD) processes have been shown to be an efficient modeling tool for studying multi-dimensional systems, especially twodimensional ones. Comp...
Liming Liu, Masakiyo Miyazawa, Yiqiang Q. Zhao
COMCOM
1998
95views more  COMCOM 1998»
13 years 8 months ago
Correlation properties of the token leaky bucket departure process
In this paper we focus on the behavior of the token leaky bucket mechanism with respect to second-order statistics of the departure process under various correlated cell arrival a...
Kenneth Mitchell, Appie van de Liefvoort, Jerry Pl...