2002
DOI: 10.1016/s0166-5316(02)00032-9
|View full text |Cite
|
Sign up to set email alerts
|

Performance bounds for rate envelope multiplexing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2003
2003
2007
2007

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 9 publications
(12 citation statements)
references
References 10 publications
0
12
0
Order By: Relevance
“…Applying this method, in our earlier works we have developed efficient conservative bounds on P sat , WLR, and based on them computationally equivalent formulae have been derived for bounding C equ,sat and C equ,WLR [12,19]. 3 Later, it has also been shown, that an improved approximation technique [17] on buffer overflow probability known in buffered statistical multiplexer can also be applied to approximate P sat under bffm.…”
Section: Bufferless Fluid Flow Multiplexingmentioning
confidence: 99%
See 1 more Smart Citation
“…Applying this method, in our earlier works we have developed efficient conservative bounds on P sat , WLR, and based on them computationally equivalent formulae have been derived for bounding C equ,sat and C equ,WLR [12,19]. 3 Later, it has also been shown, that an improved approximation technique [17] on buffer overflow probability known in buffered statistical multiplexer can also be applied to approximate P sat under bffm.…”
Section: Bufferless Fluid Flow Multiplexingmentioning
confidence: 99%
“…(3). Applying the Chernoff bounding technique for the saturation probability and workload loss ratio, the following conservative bounds can be obtained for the corresponding bandwidth requirement [12,19]:…”
Section: Equivalent Capacity Estimatorsmentioning
confidence: 99%
“…In case of two ring model K = 1 + 6 + 12 = 19. Cell 2-7 belong to the first neighboring ring while the second ring consists of cell [8][9][10][11][12][13][14][15][16][17][18][19]. Therefore, cell 2-19 form the interference region for a mobile located in cell 1.…”
Section: Involving Cellular Structure Into the Cacmentioning
confidence: 99%
“…One of the most promising classes of algorithms among them is based on Effective Bandwidth concept which was originally introduced for wired networking CAC, [1,2,11,14,15,17]. The aim of this paper is to introduce a promising solution for dynamic CAC.…”
Section: Abstract Formulation Of Cac Problemmentioning
confidence: 99%
See 1 more Smart Citation