Search
for Author
All Reviews
Sidi, Moshe
Options:
All Media Types
Journals
Proceedings
Div Books
Whole Books
Other
Date Reviewed
Title
Author
Publisher
Published Date
Descending
Ascending
Date Reviewed
1
-
5
of
5
reviews
New call blocking versus handoff blocking in cellular networks
Sidi M., Starobinski D. Wireless Networks 3(1): 15-27, 1997. Type: Article
Cellular architecture consists of a backbone network with base stations, a base station controller, a mobile switching center, a home location register, and a visitor location register. Mobile users communicate with each other and with...
...
Sep 1 1998
An optimal service policy for buffer systems
Birman A., Gail H., Hantler S., Rosberg Z. (ed), Sidi M. Journal of the ACM 42(3): 641-657, 1995. Type: Article
When developing a means to control entrance into a packet switch or server in order to avoid congestion and lost packets, buffer policy is at the top of the list. The authors describe a new class of such buffer policies, called Least T...
...
Aug 1 1996
Performance and stability of communication networks via robust exponential bounds
Yaron O., Sidi M. IEEE/ACM Transactions on Networking 1(3): 372-385, 1993. Type: Article
Some new results on bounding resource requirements for a packet network are presented. These results are important not only for packet networks but for any network that has session- or connection-oriented call paths, such as frame rela...
...
Oct 1 1994
Multiple access protocols: performance and analysis
Rom R., Sidi M., Springer-Verlag New York, Inc., New York, NY, 1990. Type: Book (9789780387972534)
Each chapter of this text is designed to discuss and analyze a different multiple access protocol. Chapter 1 is devoted to multiple access protocol classification, and chapters 2, 3, 4, and 5 address conflict-free access protocols, alo...
...
May 1 1991
Local distributed deadlock detection by cycle detection and clustering
Cidon I., Jaffe F., Sidi M. IEEE Transactions on Software Engineering 13(1): 3-14, 1987. Type: Article
The title of this paper is an accurate and concise description of the algorithm presented. The authors describe two algorithms. The first one uses a knot detection algorithm to identify the nodes of a computer network that cause deadlo...
...
Aug 1 1987
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy