Slicing in WiFi Networks Through Airtime-Based Resource Allocation

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Bicriteria Resource Allocation Problem in Pert Networks

We develop a bicriteria model for the resource allocation problem in PERT networks, in which the total direct costs of the project as the first objective, and the mean of project completion time as the second objective are minimized. The activity durations are assumed to be independent random variables with either exponential or Erlang distributions, in which the mean of each activity duration ...

متن کامل

A Multi Objective Fibonacci Search Based Algorithm for Resource Allocation in PERT Networks

The problem we investigate deals with the optimal assignment of resources to the activities of a stochastic project network. We seek to minimize the expected cost of the project include sum of resource utilization costs and lateness costs. We assume that the work content required by the activities follows an exponential distribution. The decision variables of the model are the allocated resourc...

متن کامل

Wavelet-Based Resource Allocation in ATM Networks

In recent years, numerous publications have identi ed a high number of tra c sources to be of self-similar nature. Such tra c can have a negative impact on traditional queuing systems. This paper presents a call admission control algorithm that uses periodic wavelet analysis applied to tra c measurements to estimate the amount of resources necessary to support a certain set of connections under...

متن کامل

Resource Allocation in Networks

Most work on constraint satisfaction problems (CSP) starts with a standard problem deenition and focuses on algorithms for nd-ing solutions. However, formulating a CSP so that it can be solved by such methods is often a diicult problem in itself. In this paper, we consider the problem of routing in networks, an important problem in communication networks. It is as an example of a problem where ...

متن کامل

WiFi Authentication through Social Networks

With the proliferation of WiFi-enabled devices, people expect to be able to use them everywhere, be it at work, while commuting, or when visiting friends. In the latter case, home owners are confronted with the burden of controlling the access to their WiFi router, and usually resort to simply sharing the password. Although convenient, this solution breaches basic security principles, and puts ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Network and Systems Management

سال: 2018

ISSN: 1064-7570,1573-7705

DOI: 10.1007/s10922-018-9484-x