Size-based scheduling policies have been widely studied in the literature, and their interest in networking applications has been huge in the last decade. These policies consist in deciding the priority of the packets belonging to a certain flow based on the service time that the flow has received up to a certain epoch or, when possible, on the remaining service time. The scientific literature has devoted many efforts to the comparison and analysis of these disciplines either by simulation or by analytical models although real-world implementations can have different performance for numerous reasons. In this paper, we consider the two-level processor sharing discipline (2LPS), i.e., packets are served with high priority if they belong to a ...
textabstractWe consider networks where traffic is served according to the Generalised Processor Shar...
Building on the vast body of existing TCP models, we develop a novel versatile model that explicitly...
ABSTRACT Enabled by the emergence of various access technologies (such as ADSL and wireless LAN), th...
Size-based scheduling policies have been widely studied in the literature, and their interest in net...
In many theoretical works, the benefits of size-based scheduling disciplines have been proved. The F...
We consider the dimensioning problem for Internet access links carrying TCP traffic with two priorit...
We consider the dimensioning problem for Internet access links carrying TCP traffic with two priorit...
The networking community has focused mainly on Processor Sharing (PS) policies in routers in order ...
Our goal is to achieve deeper understanding of the limita-tion of queueing models, on one hand, and ...
Previous studies have shown that giving preferential treatment to short jobs helps reduce the averag...
Processor sharing (PS) models nicely capture the bandwidth sharing and statistical multiplexing effe...
We consider networks where traffic is served according to the generalised processor sharing (GPS) pr...
Abstract Processor sharing (PS) models for TCP behavior nicely capture the bandwidth sharing and sta...
textabstractWe consider a system with two heterogeneous traffic classes. The users from both classes...
We analyze the asymptotic behavior of long-tailed traffic flows under the Generalized Processor Shar...
textabstractWe consider networks where traffic is served according to the Generalised Processor Shar...
Building on the vast body of existing TCP models, we develop a novel versatile model that explicitly...
ABSTRACT Enabled by the emergence of various access technologies (such as ADSL and wireless LAN), th...
Size-based scheduling policies have been widely studied in the literature, and their interest in net...
In many theoretical works, the benefits of size-based scheduling disciplines have been proved. The F...
We consider the dimensioning problem for Internet access links carrying TCP traffic with two priorit...
We consider the dimensioning problem for Internet access links carrying TCP traffic with two priorit...
The networking community has focused mainly on Processor Sharing (PS) policies in routers in order ...
Our goal is to achieve deeper understanding of the limita-tion of queueing models, on one hand, and ...
Previous studies have shown that giving preferential treatment to short jobs helps reduce the averag...
Processor sharing (PS) models nicely capture the bandwidth sharing and statistical multiplexing effe...
We consider networks where traffic is served according to the generalised processor sharing (GPS) pr...
Abstract Processor sharing (PS) models for TCP behavior nicely capture the bandwidth sharing and sta...
textabstractWe consider a system with two heterogeneous traffic classes. The users from both classes...
We analyze the asymptotic behavior of long-tailed traffic flows under the Generalized Processor Shar...
textabstractWe consider networks where traffic is served according to the Generalised Processor Shar...
Building on the vast body of existing TCP models, we develop a novel versatile model that explicitly...
ABSTRACT Enabled by the emergence of various access technologies (such as ADSL and wireless LAN), th...