نتایج جستجو برای: service performances

تعداد نتایج: 376666  

2000
Phil Wang Yechiam Yemini Danilo Florissi John A. Zinky Patricia Florissi

To bring QoS to the Internet, several better-thanbest-effort network services have been recently devised with significant efforts. The goal of this paper is to measure the effective performances of existing applications after incorporating QoS, and to understand what are the effects of provisioning QoS in the applications. Our experiments use two kinds of existing multimedia applications: UDP-b...

2002
Guy Juanole

Abstract: Today networks are more and more used to implement distributed applications and, in particular, industrial applications like closed loop process control which require a timeliness service to guarantee their performances. The timeliness property depends on the message and task schedulings and the communication protocol. The goal of this paper is to present a pluridisciplinary work whic...

This paper presents a new formulation for warehouse inventory management in a stochastic situation. The primary source of this formulation is derived from FP model, which has been proposed by Fletcher and Ponnambalam for reservoir management. The new proposed mathematical model is based on the first and the second moments of storage as a stochastic variable. Using this model, the expected value...

2007
Jaap Gordijn Pascal van Eck Roel Wieringa

E-services are deeds, processes and performances that are exchanged commercially and provisioned via the Internet. Such e-services rely on web-service technology as an implementation platform. One of the key problems in developing innovative e-services is to create a shared understanding of the e-service at hand, and to analyze whether the e-service is commercially viable and technically feasib...

1994
Catherine Rosenberg Gérard Hébuterne

It is well known that a single Leaky Bucket cannot control all characteristics of a source. Especially, controlling burst length and mean rate may be incompatible, while a poor control of any of these characteristics impacts directly networks performances. Given an ATM source, this paper addresses this issue and gives a general approach to choose the \best" Leaky Bucket parameters; the optimali...

2013
Clément Guérin Karell Bertet Arnaud Revel

The authors present in this paper an effective Java implementation of the concept immediate successors calculation. It is based on the lattice Java library, developed by K. Bertet and the Limited Objects Access algorithm, proposed by C. Demko and K. Bertet [6] with Java-specific enhancements. This work was motivated by the need of an efficient tool delivering this service in an accessible and p...

2002
M. Maimour C. D. Pham

Reliable multicast protocols have gained popularity with active service contributions where routers implement additional functionalities. Reducing the delay of recovery is one of the desirable features of a reliable multicast protocol. In this paper we propose an active-based architecture with specialized routers. Using simulations we show how this architecture with the proposed services (mainl...

2002
D. Ponce

The possibility of making the Internet accessible via mobile telephone has generated an important opportunity for electronic commerce. Nevertheless, the performances of mobile devices and intrinsic characteristics of wireless environments impose a set of constraints for mobile commerce development. The authors have developed alternative mechanisms based on standard technologies in order to impr...

2007
Wei Monin

An error correction procedure is currently being deened by ITU-T under the name of \Service Speciic Connection Oriented Protocol". It is to be used in the B-ISDN in conjunction with AAL5 in order to provide an error-free data link layer. We study the performances of the procedure in terms of end-to-end delay. An analytical model is presented, which allows to address various traac engineering as...

2008
Inès El Korbi Leila Azouz Saidane

In this paper, we propose to support a fixed priority real time scheduler over 802.11 protocol called Deadline Monotonic (DM). We evaluate the performances of this policy for a simple scenario where two stations with different delay constraints contend for the channel. For this scenario a Markov chain based analytical model is proposed. From the mathematical model, we derive the probability dis...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید