نتایج جستجو برای: buffer solution

تعداد نتایج: 500426  

Journal: :Annals OR 2000
Stanley B. Gershwin James E. Schor

This paper describes efficient algorithms for determining how buffer space should be allocated in a flow line. We analyze two problems: a primal problem, which minimizes total buffer space subject to a production rate constraint; and a dual problem, which maximizes production rate subject to a total buffer space constraint. The dual problem is solved by means of a gradient method, and the prima...

2001
Jörg Liebeherr Nicolas Christin

A novel algorithm, called JoBS (Joint Buffer Management and Scheduling), is presented for loss and delay differentiation of traffic classes in a packet network. JoBS has two unique capabilities: (1) JoBS makes scheduling and buffer management decisions in a single step, and (2) JoBS supports both relative and absolute QoS requirements of classes. The JoBS algorithm is presented in terms of the ...

2002
Hailong Li Jiu Jimmy Jiao

This paper presents a complete analytical solution to describe tidal groundwater level fluctuations in a coastal subsurface system. The system consists of two aquifers and a leaky layer between them. Previous solutions of Jacob [Flow of groundwater, in: H. Rouse (Ed.), Engineering Hydraulics, Wiley, New York, 1950, pp. 321–386], Jiao and Tang [Water Resour. Res. 35 (3) (1999) 747], Li and Jiao ...

Journal: :Perform. Eval. 2009
Wouter Rogiest Joke Lambert Dieter Fiems Benny Van Houdt Herwig Bruneel Chris Blondia

Novel switching approaches like Optical Burst/Packet Switching have buffering implemented with Fiber Delay Lines (FDLs). Previous performancemodels of the resulting buffer only allowed for solution by numerical means, and only for one time setting: continuous, or discrete. With a Markov chain approach, we constructed a generic framework that encompasses both time settings. The output includes c...

2009
Eugen Leontie Gedare Bloom Olga Gelbart Bhagirath Narahari Rahul Simha

Buffer overflow attacks are widely acknowledged by computer security professionals to be one of the greatest threats to the security of computer systems. We present an integrated softwarehardware approach to protect against buffer overflow attacks while minimizing performance degradation, software development time, and deployment costs. Our technique does not change the processor core, but inst...

Journal: :TRANSACTIONS OF THE JAPAN SOCIETY OF MECHANICAL ENGINEERS Series C 1987

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید