Browsing by Subject "Queueing theory"
Now showing items 1-15 of 15
-
Article
Adaptive packet scheduling over a wireless channel under constrained jamming
(2017)In this work we consider the communication over a wireless link, between a sender and a receiver, being disrupted by a jammer. The objective of the sender is to transmit as much data as possible to the receiver in the most ...
-
Article
Block Scheduling of Iterative Algorithms and Graph-Level Priority Scheduling in a Simulated Data-Flow Multiprocessor
(1993)While data-flow principles permit the utilization of large-scale multiprocessor systems with high programmability and good efficiency, they also introduce much overhead at runtime. In this paper, we have studied an important ...
-
Conference Object
-
Conference Object
-
Conference Object
-
Conference Object
Fuzzy control of ABR traffic flow in ATM LANs
(IEEE, 1995)High-speed LANs are beginning to migrate from shared media to switch based configurations (commonly based on ATM architectures). Because of the characteristics of ATM networks and nature of LAN traffic, there is a need for ...
-
Conference Object
Fuzzy logic congestion control in TCP/IP tandem networks
(2006)Network resource management and control is a complex problem that requires robust, possibly intelligent, control methodologies to obtain satisfactory performance. While many Active Queue Management (AQM) mechanisms have ...
-
Article
Global asymptotic stability of max-min congestion control schemes
(2017)A number of congestion control schemes which adopt the max-min fairness criterion and do not require maintenance of per flow states within the network have been proposed in the literature. The establishment of global ...
-
Article
The impact of network structure on the stability of greedy protocols
(2003)A packet-switching network is stable if the number of packets in the network remains bounded at all times. A very natural question that arises in the context of stability and instability properties of such networks is how ...
-
Article
The impact of network structure on the stability of greedy protocols
(2005)Some examples of the impact network structure has on stability behavior of greedy protocols and networks were presented. An important problem was to study the impact of network structure parameters on other greedy protocols. ...
-
Conference Object
Optimal control approach to dynamic bandwidth allocation in B-ISDN
(Publ by IE Aust, 1992)Asynchronous Transfer Mode (ATM) will be the transfer mode for implementing Broadband-ISDN (B-ISDN). This is prompted by the need to handle a variety of types of services, with diverse demands on the network in terms of ...
-
Article
Packet scheduling over a wireless channel: AQT-based constrained jamming
(2015)In this paper we consider a two-node setting with a sender transmitting packets to a receiver over a wireless channel. Unfortunately, the channel can be jammed, thus corrupting the packet that is being transmitted at the ...
-
Conference Object
Performance and stability bounds for dynamic networks
(2004)In this work, we study the impact of dynamically changing link capacities on the delay bounds of LIS (Longest-In-System) and SIS (Shortest-In-System) protocols on specific networks (that can be modelled as Directed Acyclic ...
-
Conference Object
Profit-aware server allocation for green internet services
(2010)A server farm is examined, where a number of servers are used to offer a service to impatient customers. Every completed request generates a certain amount of profit, running servers consume electricity for power and ...
-
Conference Object
Using request queues for enhancing the performance of operations in smart homes
(2012)Modern houses and buildings are being equipped with embedded wireless sensors and actuators, offering advanced automation possibilities. Embedded technology is becoming mature, forming an enticing option for real-life ...