Browsing by Subject "Resource allocation"
Now showing items 1-20 of 35
-
Article
Access network synthesis game in next generation networks
(2009)In next generation communication networks, multiple access networks will coexist on a common service platform. In cases where network resource planning indicates that individual access network resources are insufficient ...
-
Article
Aggregated bandwidth allocation: Investigation of performance of classical constrained and genetic algorithm based optimisation techniques
(2002)We consider a high speed integrated services network, and investigate compare and contrast the performance of two algorithms for solving the Aggregated Bandwidth Allocation (BA) problem. The algorithms we focus our attention ...
-
Conference Object
A basis for performance property prediction of ubiquitous self-adapting systems
(2007)Utility-based adaptation approaches permit to determine the "best" suited variant of an application at run-time. Utility policies are usually specified in terms of resources and QoS dimensions. Although utility policies ...
-
Article
CFP taxonomy of the approaches for dynamic web content acceleration
(2005)Approximately a decade since it was first introduced, dynamic Web content technology has been gaining in popularity over static means for content dissemination. Its rising demand for computational and network resources has ...
-
Article
Competitive analysis of task scheduling algorithms on a fault-prone machine and the impact of resource augmentation
(2015)Reliable task execution on machines that are prone to unpredictable crashes and restarts is both important and challenging, but not much work exists on the analysis of such systems. We consider the online version of the ...
-
Conference Object
A congestion control algorithm for max-min resource allocation and bounded queue sizes
(2004)This paper deals with the congestion control problem in computer networks which is viewed as a resource allocation problem constrained by the additional requirement that the queue sizes need to be bounded. We propose a ...
-
Conference Object
Context management and its applications to distributed transactions
(IEEE, 1996)An emerging paradigm that handles multiple locii of control in a system allows multiple program threads to work on the same task, each thread to work on a different task, or a thread to work on multiple tasks for greater ...
-
Article
A cost mechanism for fair pricing of resource usage
(2005)We propose a simple and intuitive cost mechanism which assigns costs for the competitive usage of m resources by n selfish agents. Each agent has an individual demand
-
Conference Object
Design space navigation for neighboring power-performance efficient microprocessor configurations
(2005)Microprocessor design is a considerably complex task. First, microprocessors include many resources that may be configured in different ways. This leads to a time consuming multi-objective optimization problem. Second, ...
-
Conference Object
An enhanced radio resource allocation approach for efficient MBMS service provision in UTRAN
(2008)As currently specified by 3GPP, MBMS (Multimedia Broadcast Multicast Service) content can be provided in a cell by either Point-to-Point (P-t-P) or Point-to-Multipoint (P-t-M) transmission mode, but not both at the same ...
-
Article
Enhanced radio resource management algorithms for efficient MBMS service provision in UTRAN
(2011)As currently specified by 3GPP, Multimedia Broadcast Multicast Service (MBMS) bearer services can be provided within a cell either by Point-to-Point (P-t-P) or Point-to-Multipoint (P-t-M) transmission mode, but not both ...
-
Article
Evolutionary-fuzzy prediction for strategic ID-QoS: Routing in broadband networks
(2001)This article presents an application of evolutionary-fuzzy prediction in interdomain routing of broadband network connections with Quality of Services requirements in the case of an integrated ATM and SDH networking ...
-
Conference Object
Fast backward predictive congestion notification for ATM networks with significant propagation delays
(1995)A fast Backward Predictive Congestion Notification (BPCN) scheme for ATM networks is proposed, whose objective is to avoid cell loss and achieve high resource utilisation during high traffic demand. A dynamic adaptive model ...
-
Conference Object
-
Conference Object
Fuzzy logic congestion control in TCP/IP tandem networks
(2006)Network resource management and control is a complex problem that requires robust, possibly intelligent, control methodologies to obtain satisfactory performance. While many Active Queue Management (AQM) mechanisms have ...
-
Article
Grid resource ranking using low-level performance measurements
(2007)This paper outlines a feasible approach to ranking Grid resources based on an easily obtainable application-specific performance model utilizing low-level performance metrics. First, Grid resources are characterized using ...
-
Conference Object
Hybrid CAC for MBMS-enabled 3G UMTS networks
(2006)In this paper, a novel hybrid Connection Admission Control (CAC) scheme combining downlink transmission power and aggregate throughput in the case of dedicated and shared connection setup respectively, is presented ("DPTCAC: ...
-
Conference Object
Integrated control of connection admission, flow rate, and bandwidth for ATM based networks
(1996)We consider the combined control problem of connection admission, flow rate, and bandwidth allocation (capacity, service-rate) under nonstationary conditions. A fluid flow model in state variable form describes the time ...
-
Conference Object
Integrated control of connection admission, flow rate, and bandwidth for ATM based networksAAA
(1996)We consider the combined control problem of connection admission, flow rate, and bandwidth allocation (capacity, service-rate) under nonstationary conditions. A fluid flow model in state variable form describes the time ...
-
Article
An investigation of web crawler behavior: Characterization and metrics
(2005)In this paper, we present a characterization study of search-engine crawlers. For the purposes of our work, we use Web-server access logs from five academic sites in three different countries. Based on these logs, we analyze ...