Sciweavers

PE
2002
Springer
158views Optimization» more  PE 2002»
14 years 2 days ago
Comparison of inter-area rekeying algorithms for secure wireless group communications
Many emerging mobile wireless applications depend upon secure group communications, in which data is encrypted and the group's data encryption key is changed whenever a membe...
Chun Zhang, Brian DeCleene, James F. Kurose, Donal...
PE
2002
Springer
137views Optimization» more  PE 2002»
14 years 2 days ago
A case study of Web server benchmarking using parallel WAN emulation
This paper describes the use of a parallel discrete-event network emulator called the Internet Protocol Traffic and Network Emulator (IP-TNE) for Web server benchmarking. The expe...
Carey L. Williamson, Rob Simmonds, Martin F. Arlit...
PE
2002
Springer
124views Optimization» more  PE 2002»
14 years 2 days ago
Continuous-time hidden Markov models for network performance evaluation
In this paper, we study the use of continuous-time hidden Markov models (CT-HMMs) for network protocol and application performance evaluation. We develop an algorithm to infer the...
Wei Wei, Bing Wang, Donald F. Towsley
PE
2002
Springer
115views Optimization» more  PE 2002»
14 years 2 days ago
Capturing the spatio-temporal behavior of real traffic data
Mengzhi Wang, Anastassia Ailamaki, Christos Falout...
PE
2002
Springer
207views Optimization» more  PE 2002»
14 years 2 days ago
Delay characteristics in discrete-time GI-G-1 queues with non-preemptive priority queueing discipline
Priority scheduling for packets is becoming a hot topic, as attemps are being made to integrate voice services in existing data networks. In this paper, we consider a discrete-tim...
Joris Walraevens, Bart Steyaert, Herwig Bruneel
PE
2002
Springer
132views Optimization» more  PE 2002»
14 years 2 days ago
Performance evaluation with temporal rewards
Today many formalisms exist for specifying complex Markov chains. In contrast, formalisms for specifying rewards, enabling the analysis of long-run average performance properties,...
Jeroen Voeten
PE
2002
Springer
150views Optimization» more  PE 2002»
14 years 2 days ago
Delimiting the range of effectiveness of scalable on-demand streaming
Previous analyses of scalable streaming protocols for delivery of stored multimedia have largely focused on how the server bandwidth required for full-file delivery scales as the ...
Haonan Tan, Derek L. Eager, Mary K. Vernon
PE
2002
Springer
176views Optimization» more  PE 2002»
14 years 2 days ago
Effective bandwidth estimation and testing for Markov sources
This work addresses the resource sharing problem in broadband communication networks that can guarantee some quality of service (QoS), and develops some results about data source ...
Juan Pechiar, Gonzalo Perera, María Simon
PE
2002
Springer
128views Optimization» more  PE 2002»
14 years 2 days ago
Response times in a two-node queueing network with feedback
The study presented in this paper is motivated by the performance analysis of response times in distributed information systems, where transactions are handled by iterative server...
Robert D. van der Mei, Bart Gijsen, N. in't Veld, ...
PE
2002
Springer
109views Optimization» more  PE 2002»
14 years 2 days ago
Load-dependent service queues with application to congestion control in broadband networks
: We analyze D/G/1 and M/G/1 queues where the service time for an arrival depends on the amount of work in the system upon arrival. The models are motivated by the bit dropping met...
Kin K. Leung