Filters








5,608 Hits in 5.0 sec

The Entropy of Cell Streams as a Traffic Descriptor in ATM Networks [chapter]

N. T. Plotkin, C. Roche
1996 Data Communications and their Performance  
We examine the properties of a promising new traffic descriptor for ATM networks, namely the entropy of cell streams.  ...  We study the entropy of ON-OFF sources with respect to the typical queue parameters of interest: average queue size, queue variance and equivalent buffers.  ...  In [Guerin, 1991) the authors determine the equivalent bandwidth for a single ON-OFF source using a fluidflow model in which both the ON and OFF periods are exponentially distributed. Since  ... 
doi:10.1007/978-0-387-34942-8_15 fatcat:fnwpxes3vrg4vepxyx6o5nyrge

Real-time estimation and dynamic renegotiation of UPC parameters for arbitrary traffic sources in ATM networks

B.L. Mark, G. Ramamurthy
1998 IEEE/ACM Transactions on Networking  
This paper presents a robust and flexible realtime scheme for determining appropriate parameter values for usage parameter control (UPC) of an arbitrary source in an asynchronous transfer mode network.  ...  The selected UPC descriptor is optimal in the sense of minimizing a network cost function, subject to meeting user-specified constraints on shaping delay.  ...  The authors are with C&C Research Laboratories, NEC USA, Princeton, NJ 08540 USA (e-mail: blmark@ccrl.nj.nec.com; mgr@ccrl.nj.nec.com). Publisher Item Identifier S 1063-6692(98)09619-8.  ... 
doi:10.1109/90.748091 fatcat:p6jtdtmy2vbjrfr6tfgphll5r4

Digital camera as a data source of ITS solutions in traffic control and management

Jan PIECHA
2012 Transport Problems  
For simplification of these all processes several solutions must be implemented. One can try reducing the data size and improve the processing algorithms.  ...  A satisfactory usage of the video technology needs various simplifications of the data source structure and the processing algorithms.  ...  The traffic volume updating determines states of cells, in a real time mode that is performed for an on-line computation.  ... 
doaj:9303b5308a9a4d2aba8050d3e45c8a96 fatcat:fb73lef5u5cuhbal6u65ce2rme

NBBS traffic management overview

H. Ahmadi, P. F. Chimento, R. A. Guerin, L. Gun, B. Lin, R. O. Onvural, T. E. Tedijanto
1995 IBM Systems Journal  
This service mostly relies on packet-level control in the form of an end-to-end rate-based flow control algorithm that regulates the flow of traffic into the network.  ...  on the first page.  ...  Also, the network user does not have to worry about the complex traffic characterization for multimedia or for other highly variable traffic sources.  ... 
doi:10.1147/sj.344.0604 fatcat:34fdczyro5f73eg52wpofmbg4y

Performance Analysis of a Fuzzy System in the Policing of Packetized Voice Sources [chapter]

Giuseppe Ficili, Daniela Panno
1996 IFIP Advances in Information and Communication Technology  
In this paper we analyze the performance of a policing mechanism based on Fuzzy Logic for the control of packetized voice sources.  ...  Analysis by simulation also shows that the fuzzy policer is efficient in the combined control of two traffic descriptors, the Sustainable Cell Rate and the long-term Average Cell Rate.  ...  For example, if the source traffic descriptor consists of the peak bit rate and the mean bit rate, UPC is necessary for both of them.  ... 
doi:10.1007/978-0-387-34987-9_18 fatcat:5ro2dxqpbrb4fnuwy6ffxkekve

On the efficiency of statistical—bitrate service for video [chapter]

G. Karlsson, G. Djuknic
1998 Performance of Information and Communication Systems  
Our argument is that the amount of information needed about a traffic source in order to· attain a fair multiplexing gain is beyond what is captured in the standard's three-parameter traffic descriptor  ...  The provisioning of quality of service by means of statistical multiplexing has been an alluring research idea for the last decade of teletraffic research.  ...  The mean and standard deviations would thus have been calculated from the traffic descriptors, rather than being the true values of the source.  ... 
doi:10.1007/978-0-387-35355-5_16 fatcat:oqweiynpafcshfluwbwujtdc7m

Efficient Transfer Bayesian Optimization with Auxiliary Information [article]

Tomoharu Iwata, Takuma Otsuka
2019 arXiv   pre-print
Our method is also advantageous because the computational costs scale linearly with the number of source tasks.  ...  We propose an efficient transfer Bayesian optimization method, which finds the maximum of an expensive-to-evaluate black-box function by using data on related optimization tasks.  ...  The computational complexity for training the proposed model linearly increases with the number of source tasks, and that for calculating the posterior distribution does not depend on the number of source  ... 
arXiv:1909.07670v1 fatcat:afo5xzwjjvc4lo54bzszlwnyg4

Towards an end-to-end delay analysis of LEO satellite networks for seamless ubiquitous access

JianZhou Chen, LiXiang Liu, XiaoHui Hu
2013 Science China Information Sciences  
Hence, to examine the delay constraint, an analytical model based on a tandem queue is established under a hot-spot traffic pattern, which is unfavorable for bounded delays.  ...  The analytical results show that this model is able to depict the influence by the traffic pattern with satisfying accuracy, which is valuable for the design of routing schemes in satellite networks.  ...  Acknowledgements This work was supported by Key Technology Research and Development Program of Chinese Academy of Science (Grant No. 6150103).  ... 
doi:10.1007/s11432-013-5000-9 fatcat:w4m6ufqpivf43f5d4d6izihm3e

Computational intelligence in management of ATM networks: a survey of the current state of research

Y. A. Sekercioglu, Andreas Pitsillides, Athanasios V. Vasilakos, Bruno Bosacchi, David B. Fogel, James C. Bezdek
1999 Applications and Science of Neural Networks, Fuzzy Systems, and Evolutionary Computation II  
Designing effective control strategies for Asynchronous Transfer Mode (ATM) networks is known to be difficult because of the complexity of the structure of networks, nature of the services supported, and  ...  Additionally, the uncertainties involved in identification of the network parameters cause analytical modeling of ATM networks to be almost impossible.  ...  The anticipated traffic characteristics of the connection are determined by a source traffic descriptor, and the user terminal declares these source traffic descriptor values to the network when the connection  ... 
doi:10.1117/12.367704 fatcat:yszfhkbskff3xnvdokkum7isja

RCBR: a simple and efficient service for multiple time-scale traffic

M. Grossglauser, S. Keshav, D.N.C. Tse
1997 IEEE/ACM Transactions on Networking  
We show that burstiness over long time scales, in conjunction with resource reservation using one-shot traffic descriptors, can substantially degrade the loss rate, end-to-end delay, and statistical multiplexing  ...  We show that the service is suitable for both stored and online video sources. An RCBR source must decide when to renegotiate its service rate and what the new service rate should be.  ...  ACKNOWLEDGMENT The authors would like to thank M. Garrett for providing the traces of MPEG-compressed Star Wars.  ... 
doi:10.1109/90.650136 fatcat:gzuxb3lgcza2llfksixqcruzge

RCBR

M. Grossglauser, S. Keshav, D. Tse
1995 Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication - SIGCOMM '95  
We show that burstiness over long time scales, in conjunction with resource reservation using one-shot traffic descriptors, can substantially degrade the loss rate, end-to-end delay, and statistical multiplexing  ...  We show that the service is suitable for both stored and online video sources. An RCBR source must decide when to renegotiate its service rate and what the new service rate should be.  ...  ACKNOWLEDGMENT The authors would like to thank M. Garrett for providing the traces of MPEG-compressed Star Wars.  ... 
doi:10.1145/217382.217436 dblp:conf/sigcomm/GrossglauserKT95 fatcat:7eyyzh7y2nftro3leibl54i2hy

RCBR

M. Grossglauser, S. Keshav, D. Tse
1995 Computer communication review  
We show that burstiness over long time scales, in conjunction with resource reservation using one-shot traffic descriptors, can substantially degrade the loss rate, end-to-end delay, and statistical multiplexing  ...  We show that the service is suitable for both stored and online video sources. An RCBR source must decide when to renegotiate its service rate and what the new service rate should be.  ...  ACKNOWLEDGMENT The authors would like to thank M. Garrett for providing the traces of MPEG-compressed Star Wars.  ... 
doi:10.1145/217391.217436 fatcat:k5dq3t2q55caponobz6htifddm

A testbed for network performance evaluation and its application to connection admission control algorithms

Magnos Martinello, Edmundo de Souza e Silva
2001 Journal of the Brazilian Computer Society  
For the studies we selected and implemented two CAC algorithms, one for a non-regulated traffic, proposed by [14] , and other for a leaky-bucket regulated traffic, proposed by [5] .  ...  The objective of this work is to present an environment we developed useful for performance analysis, measurements and experimentation, in particular for testing resource usage based on different traffic  ...  Some authors classify the CAC algorithms into those based on traffic descriptors and those based on measurements [15, 10] .  ... 
doi:10.1590/s0104-65002001000100005 fatcat:um7ozmfbgnbqdkv5b2tenmb2ba

Overview of measurement-based connection admission control methods in ATM networks

Kohei Shiomoto, Naoaki Yamanaka, Tatsuro Takahashi
1999 IEEE Communications Surveys and Tutorials  
traffic than methods in which the effect of buffer is considered.  ...  We conclude that measurement-based CAC methods based on effective bandwidth and bufferless models are promising because they do not require complex hardware and are less dependent on assumptions regarding  ...  ACKNOWLEDGMENTS The authors would like to express appreciation to the anonymous reviewers for many helpful comments.  ... 
doi:10.1109/comst.1999.5340510 fatcat:6bo252msgbdlbecwqzrcuu7r5e

B&W Call Admission Control for Multimedia Communication Networks

Lain-Chyr Hwang, San-Yuan Wang
2019 International Journal on Recent and Innovation Trends in Computing and Communication  
One of them is called black CAC controller and is used for the traffic with specifications more uncertain, which is called black traffic here.  ...  The simulation results show the B&W CAC can obtain higher utilization and still meet the QoS requirements of traffic sources.  ...  On the other hand, for some data sources their characteristics are simple and may be known beforehand.  ... 
doi:10.17762/ijritcc.v7i6.5324 fatcat:iqzzrttxobgzhc27dxal7myndu
« Previous Showing results 1 — 15 out of 5,608 results