期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
RELATIONS BETWEEN PERFORMANCE POTENTIALS AND INFINITESIMAL REALIZATION FACTORS IN CLOSED QUEUEING NETWORKS
1
作者 YinBaoqun DaiGuiping +1 位作者 XiHongsheng YangXiaoxian 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 2002年第4期458-464,共7页
In this paper,the concept of the infinitesimal realization factor is extended to the parameter dependent performance functions in closed queueing networks.Then the concepts of realization matrix (its elements are cal... In this paper,the concept of the infinitesimal realization factor is extended to the parameter dependent performance functions in closed queueing networks.Then the concepts of realization matrix (its elements are called realization factors) and performance potential are introduced,and the relations between infinitesimal realization factors and these two quantities are discussed.This provides a united framework for both IPA and non IPA approaches.Finally,another physical meaning of the service rate is given. 展开更多
关键词 closed queueing networks performance function performance potential realization matrix infinitesimal realization factor.
下载PDF
Malware-Propagative Mobile Ad Hoc Networks:Asymptotic Behavior Analysis 被引量:3
2
作者 Vasileios Karyotis Anastasios Kakalis Symeon Papavassiliou 《Journal of Computer Science & Technology》 SCIE EI CSCD 2008年第3期389-399,共11页
In this paper, the spreading of malicious software over ad hoc networks, where legitimate nodes are prone to propagate the infections they receive from either an attacker or their already infected neighbors, is analyz... In this paper, the spreading of malicious software over ad hoc networks, where legitimate nodes are prone to propagate the infections they receive from either an attacker or their already infected neighbors, is analyzed. Considering the Susceptible-Infected-Susceptible (SIS) node infection paradigm we propose a probabilistic model, on the basis of the theory of closed queuing networks, that aims at describing the aggregated behavior of the system when attacked by malicious nodes. Because of its nature, the model is also able to deal more effectively with the stochastic behavior of attackers and the inherent probabilistic nature of the wireless environment. The proposed model is able to describe accurately the asymptotic behavior of malware-propagative large scale ad hoc networking environments. Using the Norton equivalent of the closed queuing network, we obtain analytical results for its steady state behavior, which in turn is used for identifying the critical parameters affecting the operation of the network. Finally, through modeling and simulation, some additional numerical results are obtained with respect to the behavior of the system when multiple attackers are present, and regarding the time-dependent evolution and impact of an attack. 展开更多
关键词 wireless ad hoc networks infection efficiency closed queuing networks
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部