• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 7,057
Next 10 →

Packet Switching In Radio Channels: Part III -- Polling and . . .

by Fouad A. Tobagi, Leonard Kleinrock - IEEE TRANSACTIONS ON COMMUNICATIONS , 1976
"... Here we continue the analytic study of packet switching in radio channels which we reported upon in our two previous papers [ 11, [2]. Again we consider a population of terminals communicating with a central station over a packet-switched radio channel. The allocation of bandwidth among the contend ..."
Abstract - Cited by 517 (5 self) - Add to MetaCart
the contending terminals can befixed [e.g., time-division multiple access (TDMA) or frequency-division multiple access (FDMA)]-,rundom [e.&, ALOHA or carrier sen? multiple access (CSMA)] or centrally controlled (e.g., polling or reservation). In this paper we show that with a large population of bursty users

Calibrating noise to sensitivity in private data analysis

by Cynthia Dwork, Frank Mcsherry, Kobbi Nissim, Adam Smith - In Proceedings of the 3rd Theory of Cryptography Conference , 2006
"... Abstract. We continue a line of research initiated in [10, 11] on privacypreserving statistical databases. Consider a trusted server that holds a database of sensitive information. Given a query function f mapping databases to reals, the so-called true answer is the result of applying f to the datab ..."
Abstract - Cited by 649 (60 self) - Add to MetaCart
representative sample of an underlying population, the goal ofa privacy-preserving statistical database is to enable the user to learn properties of the population as a whole while protecting the privacy of the individualcontributors.

A Measurement Study of Peer-to-Peer File Sharing Systems

by Stefan Saroiu , P. Krishna Gummadi, Steven D. Gribble , 2002
"... The popularity of peer-to-peer multimedia file sharing applications such as Gnutella and Napster has created a flurry of recent research activity into peer-to-peer architectures. We believe that the proper evaluation of a peer-to-peer system must take into account the characteristics of the peers th ..."
Abstract - Cited by 1254 (15 self) - Add to MetaCart
Napster and Gnutella. In particular, our measurement study seeks to precisely characterize the population of end-user hosts that participate in these two systems. This characterization includes the bottleneck bandwidths between these hosts and the Internet at large, IP-level latencies to send packets

Ad-hoc On-Demand Distance Vector Routing

by Charles E. Perkins, Elizabeth M. Royer - IN PROCEEDINGS OF THE 2ND IEEE WORKSHOP ON MOBILE COMPUTING SYSTEMS AND APPLICATIONS , 1997
"... An ad-hoc network is the cooperative engagement of a collection of mobile nodes without the required intervention of any centralized access point or existing infrastructure. In this paper we present Ad-hoc On Demand Distance Vector Routing (AODV), a novel algorithm for the operation of such ad-hoc n ..."
Abstract - Cited by 3240 (14 self) - Add to MetaCart
-hoc networks. Each Mobile Host operates as a specialized router, and routes are obtained as needed (i.e., on-demand) with little or no reliance on periodic advertisements. Our new routing algorithm is quite suitable for a dynamic selfstarting network, as required by users wishing to utilize ad-hoc networks

Multiobjective Optimization Using Nondominated Sorting in Genetic Algorithms

by N. Srinivas, Kalyanmoy Deb - Evolutionary Computation , 1994
"... In trying to solve multiobjective optimization problems, many traditional methods scalarize the objective vector into a single objective. In those cases, the obtained solution is highly sensitive to the weight vector used in the scalarization process and demands the user to have knowledge about t ..."
Abstract - Cited by 539 (5 self) - Add to MetaCart
In trying to solve multiobjective optimization problems, many traditional methods scalarize the objective vector into a single objective. In those cases, the obtained solution is highly sensitive to the weight vector used in the scalarization process and demands the user to have knowledge about

Emerging trends in the WWW user population

by James E. Pitkow, Colleen M. Kehoe, J. Pitkow, C. Kehoe - Communications of the ACM , 1996
"... Vast amounts of attention and resources have recently been devoted towards the World Wide Web (WWW) [Berners-Lee 94], but relatively little research has been conducted that examines Web usage and societal implications. With the goals of understanding the Web user population and promoting the Web as ..."
Abstract - Cited by 67 (1 self) - Add to MetaCart
Vast amounts of attention and resources have recently been devoted towards the World Wide Web (WWW) [Berners-Lee 94], but relatively little research has been conducted that examines Web usage and societal implications. With the goals of understanding the Web user population and promoting the Web

On Utilizing the Correlations between User Populations for Traffic Inference

by K.-C. Lan, J. Heidemann , 2003
"... Network models today are often derived from two different methods. On one hand, detailed traffic models are generated based on traces from a single tap into the network. Alternatively, one can collect higher-level traffic-matrix data with SNMP from many routers. However, inferring flow-level details ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
tax storage and computation resources. In this work, we propose a methodology to infer flow-level traffic across a network by exploiting the correlations between user populations across different networks. The contribution of this paper is threefold. First, we provide a formal description by which one

DESIGN EXPLORATION: ENGAGING A LARGER USER POPULATION

by John Michael Moore, John Michael Moore , 2007
"... Software designers must understand the domain, work practices, and user expectations before determining requirements or generating initial design mock-ups. Users and other stakeholders are a valuable source of information leading to that understanding. Much work has focused on design approaches that ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
that include users in the software development process. These approaches vary from surveys and questionnaires that garner responses from a population of potential users to participatory design processes where representative users are included in the design/development team. The Design Exploration approach

Foh, “Analysis of cognitive radio spectrum access with finite user population

by Eric W. M. Wong, Senior Member, Chuan Heng Foh, Senior Member - IEEE Commun. Lett , 2009
"... Abstract—A new loss model for cognitive radio spectrum access with finite user population are presented, and exact solution for the model and its approximation for computation scalability are given. Our model provides the investigation of the delay performance of a cognitive radio system. We study t ..."
Abstract - Cited by 7 (0 self) - Add to MetaCart
Abstract—A new loss model for cognitive radio spectrum access with finite user population are presented, and exact solution for the model and its approximation for computation scalability are given. Our model provides the investigation of the delay performance of a cognitive radio system. We study

Usage-based Pricing of Packet Data Generated by a Heterogeneous User Population

by Michael L. Honig - Proc. IEEE INFOCOM , 1995
"... Usage-based pricing of offered traffic to a data network can be an effective technique for congestion control. To gain insight into the benejits usage-based pricing offers, we propose and study a simple model in which many users wish to transmit packets to a single-server queue. Based on the announc ..."
Abstract - Cited by 18 (0 self) - Add to MetaCart
S is determined by a jixed-point equation. The relationships among price, QoS, revenue, and server capacity are illustrated numerically, assuming a partic-ular type of random user population. These examples indicate that adjusting the price to maximize revenue results in an efficient use of service capacity
Next 10 →
Results 1 - 10 of 7,057
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University