Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Sidi, Moshe Add to Alert Profile  
 
Options:
Date Reviewed  
  1 - 5 of 5 reviews    
  New call blocking versus handoff blocking in cellular networks
Sidi M., Starobinski D. Wireless Networks 3(1): 15-27, 1997.  Type: Article

Cellular architecture consists of a backbone network with base stations, a base station controller, a mobile switching center, a home location register, and a visitor location register. Mobile users communicate with each other and with...
...
Sep 1 1998  
  An optimal service policy for buffer systems
Birman A., Gail H., Hantler S., Rosberg Z. (ed), Sidi M. Journal of the ACM 42(3): 641-657, 1995.  Type: Article

When developing a means to control entrance into a packet switch or server in order to avoid congestion and lost packets, buffer policy is at the top of the list. The authors describe a new class of such buffer policies, called Least T...
...
Aug 1 1996  
  Performance and stability of communication networks via robust exponential bounds
Yaron O., Sidi M. IEEE/ACM Transactions on Networking 1(3): 372-385, 1993.  Type: Article

Some new results on bounding resource requirements for a packet network are presented. These results are important not only for packet networks but for any network that has session- or connection-oriented call paths, such as frame rela...
...
Oct 1 1994  
  Multiple access protocols: performance and analysis
Rom R., Sidi M., Springer-Verlag New York, Inc., New York, NY, 1990.  Type: Book (9789780387972534)

Each chapter of this text is designed to discuss and analyze a different multiple access protocol. Chapter 1 is devoted to multiple access protocol classification, and chapters 2, 3, 4, and 5 address conflict-free access protocols, alo...
...
May 1 1991  
  Local distributed deadlock detection by cycle detection and clustering
Cidon I., Jaffe F., Sidi M. IEEE Transactions on Software Engineering 13(1): 3-14, 1987.  Type: Article

The title of this paper is an accurate and concise description of the algorithm presented. The authors describe two algorithms. The first one uses a knot detection algorithm to identify the nodes of a computer network that cause deadlo...
...
Aug 1 1987  

   
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy