首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   44篇
  免费   0篇
化学   4篇
数学   13篇
无线电   27篇
  2016年   1篇
  2014年   3篇
  2011年   2篇
  2009年   3篇
  2008年   3篇
  2006年   2篇
  2005年   1篇
  2003年   4篇
  2002年   3篇
  2001年   1篇
  2000年   4篇
  1996年   1篇
  1994年   2篇
  1993年   2篇
  1990年   1篇
  1988年   1篇
  1987年   1篇
  1986年   1篇
  1983年   1篇
  1982年   1篇
  1980年   2篇
  1979年   2篇
  1977年   1篇
  1973年   1篇
排序方式: 共有44条查询结果,搜索用时 187 毫秒
1.
On the physical and logical topology design of large-scale optical networks   总被引:3,自引:0,他引:3  
We consider the problem of designing a network of optical cross-connects (OXCs) to provide end-to-end lightpath services to large numbers of label switched routers (LSRs). We present a set of heuristic algorithms to address the combined problem of physical topology design (i.e., determine the number of OXCs required and the fiber links among them) and logical topology design (i.e., determine the routing and wavelength assignment for the lightpaths among the LSRs). Unlike previous studies which were limited to small topologies with a handful of nodes and a few tens of lightpaths, we have applied our algorithms to networks with hundreds or thousands of LSRs and with a number of lightpaths that is an order of magnitude larger than the number of LSRs. In order to characterize the performance of our algorithms, we have developed lower bounds which can be computed efficiently. We present numerical results for up to 1000 LSRs and for a wide range of system parameters such as the number of wavelengths per fiber, the number of transceivers per LSR, and the number of ports per OXC. The results indicate that it is possible to build large-scale optical networks with rich connectivity in a cost-effective manner, using relatively few but properly dimensioned OXCs.  相似文献   
2.
Call admission control schemes: a review   总被引:11,自引:0,他引:11  
Over the last few years, a substantial number of call admission control (CAC) schemes have been proposed for ATM networks. We review the salient features of some of these algorithms. Also, we quantitatively compare the performance of three of these schemes  相似文献   
3.
4.
Harry G. Perros 《TOP》2014,22(2):449-453
The paper under discussion is a well-written exposition on the performance modeling of communication systems by discrete-time queueing systems, and their analysis. It basically consists of two parts: a review of the literature, focusing on the modelling of information streams and on scheduling disciplines (Sects. 2, 3), and a demonstration of some key methods for the analysis of discrete-time queueing systems, focusing on a particular two-class discrete-time queue with correlated arrivals and two priority classes (Sects. 4–6). In Sect. 1 of the present note, we make some introductory comments. In Sect. 2, realizing that the literature review in Bruneel et al. (TOP, 2014) is authoritative and extensive, we focus on a few adjacent topics which fall outside the scope of Bruneel et al. (TOP, 2014) but which in our view may also be of some interest. Finally, in Sect. 3, we discuss the analysis in Sects. 4–6 of Bruneel et al. (TOP, 2014).  相似文献   
5.
An open queuing network for analyzing multilayered window flow control mechanisms consisting of different subnetworks is presented. The number of customers in each subnetwork is controlled by a semaphore queue. The queuing network is analyzed approximately using decomposition and aggregation. The approximation was validated against exact numerical and simulation data, and it was found to have an acceptable relative error. The queuing model is easy to implement, and it can be included in a software package. Using this queuing network, a case study involving the modeling and analysis of the ISO X25 flow control mechanism is presented  相似文献   
6.
We model the shared buffer ATM switch as a discrete-time queueing system. The arrival process to each port of the ATM switch is assumed to be bursty and it is modelled by an interrupted Bernoulli process. The discrete-time queueing system is analyzed approximately. It is first decomposed into subsystems, and then each subsystem is analyzed separately. The results from the subsystems are combined together through an iterative scheme. The analysis of each subsystem involves the construction of the superposition of all the arrival processes to the switch. Comparisons with simulation data showed that the approximate results have a good accuracy.Supported in part by DARPA under Grant No. DAEA18-90-C-0039.Work done while on a sabbatical leave of absence at the Computer Science Department of North Carolina State University.  相似文献   
7.
8.
The blocking process in some particular exponential open queue networks is studied. The networks are in the form of two-stage and three-stage queue networks with finite intermediate waitingroom. FIFO scheduling is assumed. Blocking occurs when the flow of units through one queue is momentarily stopped owing to a capacity limitation of another queue have been reached. Exact and approximate bounds for the mean blocking time in these networks are obtained. The condition for stability in the two-stage networks is also derived. Finally the applicability of the results obtained is demonstrated through a case study.  相似文献   
9.
This paper studies the performance of various strategies for scheduling a combined load of unicast and multicast traffic in a broadcast WDM network. The performance measure of interest is schedule length, which directly affects both aggregate network throughput and average packet delay. Three different scheduling strategies are presented, namely: separate scheduling of unicast and multicast traffic, treating multicast traffic as a number of unicast messages, and treating unicast traffic as multicasts of size one. A lower bound on the schedule length for each strategy is first obtained. Subsequently, the strategies are compared against each other using extensive simulation experiments in order to establish the regions of operation, in terms of a number of relevant system parameters, for which each strategy performs best. Our main conclusions are as follows. Multicast traffic can be treated as unicast traffic, by replicating all multicast packets, under very limited circumstances. On the other hand, treating unicast traffic as a special case of multicast traffic with a group of size 1, produces short schedules in most cases. Alternatively, scheduling and transmitting each traffic component separately is also a good choice.  相似文献   
10.
A Comparison of Allocation Policies in Wavelength Routing Networks*   总被引:2,自引:0,他引:2  
We consider wavelength routing networks with and without wavelength converters, and several wavelength allocation policies. Through numerical and simulation results we obtain upper and lower bounds on the blocking probabilities for two wavelength allocation policies that are most likely to be used in practice, namely, most-used and first-fit allocation. These bounds are the blocking probabilities obtained by the random wavelength allocation policy with either no converters or with converters at all nodes of the network. Furthermore, we demonstrate that using the most-used or first-fit policies gives an improvement on call blocking probabilities that is equivalent to employing converters at a number of nodes in a network with the random allocation policy. These results have been obtained for a wide range of loads for both single-path and general mesh topology networks. The main conclusion of our work is that the gains obtained by employing specialized and expensive hardware (namely, wavelength converters) can be realized cost-effectively by making more intelligent choices in software (namely, the wavelength allocation policy).  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号