Slicing in WiFi Networks Through Airtime-Based Resource Allocation
نویسندگان
چکیده
منابع مشابه
Bicriteria Resource Allocation Problem in Pert Networks
We develop a bicriteria model for the resource allocation problem in PERT networks, in which the total direct costs of the project as the first objective, and the mean of project completion time as the second objective are minimized. The activity durations are assumed to be independent random variables with either exponential or Erlang distributions, in which the mean of each activity duration ...
متن کاملA Multi Objective Fibonacci Search Based Algorithm for Resource Allocation in PERT Networks
The problem we investigate deals with the optimal assignment of resources to the activities of a stochastic project network. We seek to minimize the expected cost of the project include sum of resource utilization costs and lateness costs. We assume that the work content required by the activities follows an exponential distribution. The decision variables of the model are the allocated resourc...
متن کاملWavelet-Based Resource Allocation in ATM Networks
In recent years, numerous publications have identi ed a high number of tra c sources to be of self-similar nature. Such tra c can have a negative impact on traditional queuing systems. This paper presents a call admission control algorithm that uses periodic wavelet analysis applied to tra c measurements to estimate the amount of resources necessary to support a certain set of connections under...
متن کاملResource Allocation in Networks
Most work on constraint satisfaction problems (CSP) starts with a standard problem deenition and focuses on algorithms for nd-ing solutions. However, formulating a CSP so that it can be solved by such methods is often a diicult problem in itself. In this paper, we consider the problem of routing in networks, an important problem in communication networks. It is as an example of a problem where ...
متن کاملWiFi Authentication through Social Networks
With the proliferation of WiFi-enabled devices, people expect to be able to use them everywhere, be it at work, while commuting, or when visiting friends. In the latter case, home owners are confronted with the burden of controlling the access to their WiFi router, and usually resort to simply sharing the password. Although convenient, this solution breaches basic security principles, and puts ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Network and Systems Management
سال: 2018
ISSN: 1064-7570,1573-7705
DOI: 10.1007/s10922-018-9484-x