• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 5,203
Next 10 →

Exact admission control in networks with bounded delay services

by Jörg Liebeherr, Dallas E. Wrege, Domenico Ferrari - IEEE/ACM TRANSACTIONS ON NETWORKING , 1996
"... To support the requirements for the transmission of continuous media, such as audio and video, multiservice packet switching networks must provide service guarantees to connections, including guarantees on throughput, network delays, and network delay variations. For the most demanding applications, ..."
Abstract - Cited by 175 (19 self) - Add to MetaCart
, the network must offer a service which can provide deterministic guarantees for the maximum delay ofpackets from all connections, referred to as bounded delay service. The admission control functions in a network with a bounded delay service must have available schedulability conditions that detect violations

Contention Resolution with Bounded Delay

by Mike Paterson, Aravind Srinivasan - In Proc. FOCS'95, IEEE Computer
"... When distributed processes contend for a shared resource, we need a good distributed contention resolution protocol, e.g., for multiple-access channels (ALOHA, Ethernet), PRAM emulation, and optical routing. Under a stochastic model of request generation from n synchronous processes, Raghavan & ..."
Abstract - Cited by 6 (0 self) - Add to MetaCart
; Upfal have shown a protocol which is stable for a positive request rate; their main result is that for every resource request, its expected delay (time to get serviced) is O(log n). Assuming that the initial clock times of the processes are within a known bound of each other, we present a stable

Survivable Networks with Bounded Delay

by Serafino Cicerone, Gabriele Di Stefano, Dagmar Handke , 1999
"... We investigate new classes of graphs which guarantee constant delays even in the case of multiple edge failures. This means the following: as long as two vertices remain connected if some edges have failed, then the distance between these vertices in the faulty graph is at most a constant factor k t ..."
Abstract - Add to MetaCart
We investigate new classes of graphs which guarantee constant delays even in the case of multiple edge failures. This means the following: as long as two vertices remain connected if some edges have failed, then the distance between these vertices in the faulty graph is at most a constant factor k

Bounding Delays in Packet-Routing Networks

by Mor Harchol-balter, David Wolfe - In Proceedings of the Twenty-Seventh Annual ACM Symposium on the Theory of Computing , 1995
"... Consider the problem of computing the average packet delay in a general dynamic packet-routing network with Poisson input stream, during steady-state. Any packet-routing network can be formulated as a queueing network, where each server has a constant service time. If each server had exponentially-d ..."
Abstract - Cited by 27 (1 self) - Add to MetaCart
-distributed service time, queueing theory techniques could be used to determine the expected packet delay. However, it is not known how to compute the average packet delay for all but the simplest networks with constant time servers. It has been conjectured that to get an upper bound on expected packet delay

Bounded Delay for Weighted Round Robin

by Kert Mezger, David W. Petr
"... Contents 1 Introduction 2 1.1 Weighted Round Robin Resource Allocation : : : : : : : : : : 2 1.2 System Configuration and Assumptions : : : : : : : : : : : : : 4 2 Results 6 2.1 Sliding Window Shaper and Block WRR Scheduler : : : : : : 6 2.1.1 Analysis : : : : : : : : : : : : : : : : : : : : : : : ..."
Abstract - Cited by 5 (2 self) - Add to MetaCart
Contents 1 Introduction 2 1.1 Weighted Round Robin Resource Allocation : : : : : : : : : : 2 1.2 System Configuration and Assumptions : : : : : : : : : : : : : 4 2 Results 6 2.1 Sliding Window Shaper and Block WRR Scheduler : : : : : : 6 2.1.1 Analysis : : : : : : : : : : : : : : : : : : : : : : : : : : 6 2.1.2 Validation by Simulation : : : : : : : : : : : : : : : : : 12 2.2 Sliding Window Shaper and Distributed WRR Scheduler : : : : : 18 2.2.1 Analysis : : : : : : : : : : : : : : : : : : : : : : : : : : 18 2.2.2 Validation by Simulation : : : : : : : : : : : : : : : : : 19 2.3 Leaky Bucket Shaper and Block WRR Scheduler : : : : : : : : : 21 2.3.1 Analysis : : : : : : : : : : : : : : : : : : : : : : : : : : 21 2.3.2 Validation by Simulation : : : : : : :

Bounded Delay with High Efficiency in Multihop Wireless Networks

by Soroush Jahromizadeh
"... Jahromizadeh, Soroush (2013). Join rate control and scheduling for providing bounded delay with high efficiency in multihop wireless networks. (Unpublished Doctoral thesis, City University London) ..."
Abstract - Add to MetaCart
Jahromizadeh, Soroush (2013). Join rate control and scheduling for providing bounded delay with high efficiency in multihop wireless networks. (Unpublished Doctoral thesis, City University London)

Bounded Delay Scheduling with Packet Dependencies

by Michael Markovitch, Gabriel Scalosub
"... Abstract—A common situation occurring when dealing with multimedia traffic is having large data frames fragmented into smaller IP packets, and having these packets sent independently through the network. For real-time multimedia traffic, dropping even few packets of a frame may render the entire fra ..."
Abstract - Add to MetaCart
, and are derived from stringent delay constraints posed by the application. The figure of merit in such environments is maximizing the system’s goodput, namely, the number of frames successfully delivered. We study online algorithms for the problem of maximizing goodput of delay-bounded traffic with inter

Bounded Delay for Weighted Round Robin

by With Burst Crediting, Kert Mezger, David W. Petr , 1995
"... Contents 1 Introduction 2 2 Description of Burst Crediting 2 3 Results 10 3.1 Maximum Delay for Bursty Sources :::::::::::::::: 10 3.1.1 Sliding Window Shaper :::::::::::::::::: 10 3.1.2 Leaky Bucket Shaper ::::::::::::::::::: 17 3.2 Maximum Delay for Nonbursty Sources :::::::::::::: 22 3.2.1 Slidi ..."
Abstract - Add to MetaCart
Contents 1 Introduction 2 2 Description of Burst Crediting 2 3 Results 10 3.1 Maximum Delay for Bursty Sources :::::::::::::::: 10 3.1.1 Sliding Window Shaper :::::::::::::::::: 10 3.1.2 Leaky Bucket Shaper ::::::::::::::::::: 17 3.2 Maximum Delay for Nonbursty Sources :::::::::::::: 22 3

Bounded Delay for Weighted Round Robin

by Sponsor Sprint Kert, Kert Mezger, David W. Petr , 1995
"... Contents 1 Introduction 2 1.1 Weighted Round Robin Resource Allocation :::::::::: 2 1.2 System Configuration and Assumptions ::::::::::::: 4 2 Results 6 2.1 Sliding Window Shaper and Block WRR Scheduler :::::: 6 2.1.1 Analysis :::::::::::::::::::::::::: 6 2.1.2 Validation by Simulation :::::::::::: ..."
Abstract - Add to MetaCart
::::::::::::::::: 25 2.4 Leaky Bucket Shaper and Distributed WRR Scheduling :::::: 29 2.4.1 Analysis :::::::::::::::::::::::::: 29 2.4.2 Validation by Simulation ::::::::::::::::: 33 1 Introduction Average delay is a common measurement in determining whether or not telecommunication network customers are getting

Verification of Bounded Delay Asynchronous Circuits with Timed Traces

by Tomohiro Yoneda, Bin Zhou, Bernd-Holger Schlingloff - LNCS 1548 AMAST’98 , 1998
"... In this paper, we extend the verification method based on the failure semantics of process algebra and the resulting trace theory by Dill et al. for bounded delay asynchronous circuits. We define a timed conformance relation between trace structures which allows to express both safety and respon ..."
Abstract - Cited by 7 (5 self) - Add to MetaCart
In this paper, we extend the verification method based on the failure semantics of process algebra and the resulting trace theory by Dill et al. for bounded delay asynchronous circuits. We define a timed conformance relation between trace structures which allows to express both safety
Next 10 →
Results 1 - 10 of 5,203
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University