Results 1 - 10
of
7,057
Packet Switching In Radio Channels: Part III -- Polling and . . .
- IEEE TRANSACTIONS ON COMMUNICATIONS
, 1976
"... Here we continue the analytic study of packet switching in radio channels which we reported upon in our two previous papers [ 11, [2]. Again we consider a population of terminals communicating with a central station over a packet-switched radio channel. The allocation of bandwidth among the contend ..."
Abstract
-
Cited by 517 (5 self)
- Add to MetaCart
the contending terminals can befixed [e.g., time-division multiple access (TDMA) or frequency-division multiple access (FDMA)]-,rundom [e.&, ALOHA or carrier sen? multiple access (CSMA)] or centrally controlled (e.g., polling or reservation). In this paper we show that with a large population of bursty users
Calibrating noise to sensitivity in private data analysis
- In Proceedings of the 3rd Theory of Cryptography Conference
, 2006
"... Abstract. We continue a line of research initiated in [10, 11] on privacypreserving statistical databases. Consider a trusted server that holds a database of sensitive information. Given a query function f mapping databases to reals, the so-called true answer is the result of applying f to the datab ..."
Abstract
-
Cited by 649 (60 self)
- Add to MetaCart
representative sample of an underlying population, the goal ofa privacy-preserving statistical database is to enable the user to learn properties of the population as a whole while protecting the privacy of the individualcontributors.
A Measurement Study of Peer-to-Peer File Sharing Systems
, 2002
"... The popularity of peer-to-peer multimedia file sharing applications such as Gnutella and Napster has created a flurry of recent research activity into peer-to-peer architectures. We believe that the proper evaluation of a peer-to-peer system must take into account the characteristics of the peers th ..."
Abstract
-
Cited by 1254 (15 self)
- Add to MetaCart
Napster and Gnutella. In particular, our measurement study seeks to precisely characterize the population of end-user hosts that participate in these two systems. This characterization includes the bottleneck bandwidths between these hosts and the Internet at large, IP-level latencies to send packets
Ad-hoc On-Demand Distance Vector Routing
- IN PROCEEDINGS OF THE 2ND IEEE WORKSHOP ON MOBILE COMPUTING SYSTEMS AND APPLICATIONS
, 1997
"... An ad-hoc network is the cooperative engagement of a collection of mobile nodes without the required intervention of any centralized access point or existing infrastructure. In this paper we present Ad-hoc On Demand Distance Vector Routing (AODV), a novel algorithm for the operation of such ad-hoc n ..."
Abstract
-
Cited by 3240 (14 self)
- Add to MetaCart
-hoc networks. Each Mobile Host operates as a specialized router, and routes are obtained as needed (i.e., on-demand) with little or no reliance on periodic advertisements. Our new routing algorithm is quite suitable for a dynamic selfstarting network, as required by users wishing to utilize ad-hoc networks
Multiobjective Optimization Using Nondominated Sorting in Genetic Algorithms
- Evolutionary Computation
, 1994
"... In trying to solve multiobjective optimization problems, many traditional methods scalarize the objective vector into a single objective. In those cases, the obtained solution is highly sensitive to the weight vector used in the scalarization process and demands the user to have knowledge about t ..."
Abstract
-
Cited by 539 (5 self)
- Add to MetaCart
In trying to solve multiobjective optimization problems, many traditional methods scalarize the objective vector into a single objective. In those cases, the obtained solution is highly sensitive to the weight vector used in the scalarization process and demands the user to have knowledge about
Emerging trends in the WWW user population
- Communications of the ACM
, 1996
"... Vast amounts of attention and resources have recently been devoted towards the World Wide Web (WWW) [Berners-Lee 94], but relatively little research has been conducted that examines Web usage and societal implications. With the goals of understanding the Web user population and promoting the Web as ..."
Abstract
-
Cited by 67 (1 self)
- Add to MetaCart
Vast amounts of attention and resources have recently been devoted towards the World Wide Web (WWW) [Berners-Lee 94], but relatively little research has been conducted that examines Web usage and societal implications. With the goals of understanding the Web user population and promoting the Web
On Utilizing the Correlations between User Populations for Traffic Inference
, 2003
"... Network models today are often derived from two different methods. On one hand, detailed traffic models are generated based on traces from a single tap into the network. Alternatively, one can collect higher-level traffic-matrix data with SNMP from many routers. However, inferring flow-level details ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
tax storage and computation resources. In this work, we propose a methodology to infer flow-level traffic across a network by exploiting the correlations between user populations across different networks. The contribution of this paper is threefold. First, we provide a formal description by which one
DESIGN EXPLORATION: ENGAGING A LARGER USER POPULATION
, 2007
"... Software designers must understand the domain, work practices, and user expectations before determining requirements or generating initial design mock-ups. Users and other stakeholders are a valuable source of information leading to that understanding. Much work has focused on design approaches that ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
that include users in the software development process. These approaches vary from surveys and questionnaires that garner responses from a population of potential users to participatory design processes where representative users are included in the design/development team. The Design Exploration approach
Foh, “Analysis of cognitive radio spectrum access with finite user population
- IEEE Commun. Lett
, 2009
"... Abstract—A new loss model for cognitive radio spectrum access with finite user population are presented, and exact solution for the model and its approximation for computation scalability are given. Our model provides the investigation of the delay performance of a cognitive radio system. We study t ..."
Abstract
-
Cited by 7 (0 self)
- Add to MetaCart
Abstract—A new loss model for cognitive radio spectrum access with finite user population are presented, and exact solution for the model and its approximation for computation scalability are given. Our model provides the investigation of the delay performance of a cognitive radio system. We study
Usage-based Pricing of Packet Data Generated by a Heterogeneous User Population
- Proc. IEEE INFOCOM
, 1995
"... Usage-based pricing of offered traffic to a data network can be an effective technique for congestion control. To gain insight into the benejits usage-based pricing offers, we propose and study a simple model in which many users wish to transmit packets to a single-server queue. Based on the announc ..."
Abstract
-
Cited by 18 (0 self)
- Add to MetaCart
S is determined by a jixed-point equation. The relationships among price, QoS, revenue, and server capacity are illustrated numerically, assuming a partic-ular type of random user population. These examples indicate that adjusting the price to maximize revenue results in an efficient use of service capacity
Results 1 - 10
of
7,057