


default search action
3. VALUETOOLS 2008: Athens, Greece
- John S. Baras, Costas Courcoubetis:
3rd International ICST Conference on Performance Evaluation Methodologies and Tools, VALUETOOLS 2008, Athens, Greece, October 20-24, 2008. ICST/ACM 2008, ISBN 978-963-9799-31-8
2nd International ICST Workshop on Game Theory in Communication Networks (GameComm 2008)
Power control
- Shrutivandana Sharma, Demosthenis Teneketzis:
A game-theoretic approach to decentralized optimal power allocation for cellular networks. 1 - Nem Stefanovic, Lacra Pavel
:
A Lyapunov-Krasovskii stability analysis for game-theoretic based power control in optical networks. 2 - Yan Pan, Tansu Alpcan, Lacra Pavel
:
Effects of parameters on Nash games with OSNR target. 3 - Yezekael Hayel, Samson Lasaulce, Rachid El Azouzi
, Mérouane Debbah:
Introducing hierarchy in energy-efficient power control games. 4 - Hamidou Tembine
, Eitan Altman, Rachid El Azouzi, Yezekael Hayel:
Stochastic population games with individual independent states and coupled constraints. 5
Resource allocation and selection
- Matteo Cesana, Nicola Gatti, Ilaria Malanchini:
Game theoretic analysis of wireless access network selection: models, inefficiency bounds, and algorithms. 6 - László Toka, Pietro Michiardi:
Analysis of user-driven peer selection in peer-to-peer backup and storage systems. 7 - Benjamin Yolken, Nicholas Bambos:
Game based capacity allocation for utility computing environments. 8 - Ishai Menache, Nahum Shimkin:
Reservation-based distributed medium access in wireless collision channels. 9
Routing
- Georgios Koltsidas, Fotini-Niovi Pavlidou:
Towards a game theoretic formulation of clustering routing in wireless sensor networks. 10 - Matthew Roughan
, Yin Zhang:
GATEway: symbiotic inter-domain traffic engineering. 11 - Eitan Altman, Urtzi Ayesta, Balakrishna J. Prabhu:
Load balancing in processor sharing systems. 12
3rd International ICST Workshop on Tools for solving Structured Markov Chains (SMCTools 2008)
Session 1
- José Niño-Mora:
Computing an index policy for multiarmed bandits with deadlines. 13
Session 2
- Denis I. Miretskiy, Werner R. W. Scheinhardt
, M. R. H. Mandjes:
Simulation of a Jackson tandem network using state-dependent importance sampling. 14 - Stephan Heckmüller, Michael Spork, Bernd E. Wolfinger:
Load transformation of Markovian arrival processes: methods and tool support. 15 - Juan F. Pérez, Jeroen Van Velthoven, Benny Van Houdt:
Q-MAM: a tool for solving infinite queues using matrix-analytic methods. 16 - Ahmad Al Hanbali, Roland de Haan, Richard J. Boucherie, Jan-Kees C. W. van Ommeren:
Time-limited and k-limited polling systems: a matrix analytic solution. 17
Session 3
- Ivana Pultarová
:
Iterative aggregation: disaggregation methods and ordering algorithms. 18 - Nelly Litvak, Philippe Robert:
Analysis of an on-line algorithm for solving large Markov chains. 19
Session 4
- Alexander Pechinkin, Sergey Shorgin:
The discrete-time queueing system with inversive service order and probabilistic priority. 20 - Nihal Pekergin, Sana Younès:
CSRL model checking with closed-form bounding distributions. 21 - Alexander I. Zeifman
, Yakov Satin, Alexander Chegodaev, Vladimir Bening, Vsevolod Shorgin:
Some bounds for M(t)/M(t)/S queue with catastrophes. 22
3rd International ICST Conference on Performance Evaluation Methodologies and Tools (VALUETOOLS 2008)
Wireless networks I
- Olivier Brun, Anouar Rachdi, Jean-Marie Garcia:
Access network design with capacity-dependent costs. 23 - Bartlomiej Blaszczyszyn, Mohamed Kadhem Karray:
An efficient analytical method for dimensioning of CDMA cellular networks serving streaming calls. 24 - Vicent Pla
, Jorma T. Virtamo, Jorge Martínez-Bauset:
Optimal robust policies for bandwidth allocation and admission control in wireless networks. 25 - Swaprava Nath
, Anurag Kumar
:
Performance evaluation of distance-hop proportionality on geometric graph models of dense sensor networks. 26
Simulation
- Ana Busic
, Bruno Gaujal, Jean-Marc Vincent:
Perfect simulation and non-monotone Markovian systems. 27 - Sofia Kyriazopoulou-Panagiotopoulou, Ioannis Kontoyiannis, Sean P. Meyn:
Control variates as screening functions. 28 - Vivek S. Borkar, Sean P. Meyn:
Oja's algorithm for graph clustering and Markov spectral decomposition. 29 - Daniel Sigalov, Nahum Shimkin:
Cross-entropy based data association for multi target tracking. 30
Wireless networks II
- Svetlana Radosavac, John S. Baras:
Performance evaluation and trade-offs of optimal back-off misbehavior detection schemes in wireless networks in the presence of interference. 31 - Philippe Godlewski, Masood Maqbool, Marceau Coupechoux, Jean-Marc Kelif:
Analytical evaluation of various frequency reuse schemes in cellular OFDMA networks. 32 - Eitan Altman, Konstantin Avrachenkov
, Andrey Garnaev:
Fair resource allocation in wireless networks in the presence of a jammer. 33 - Ina Maria Verloop, Urtzi Ayesta, Sem C. Borst:
Comparison of bandwidth-sharing policies in a linear network. 34
Stochastic models in physics I
- Olivier Bénichou, Sylvain Condamin, Vincent Tejedor, Raphael Voituriez, Joseph Klafter:
First-passage times in confined geometrys. 35 - Iddo Eliazar:
Lorenzian analysis of infinite poissonian populations and the phenomena of Paretian ubiquity. 36 - Shlomi Reuveni, Rony Granek
, Joseph Klafter:
Proteins: coexistence of stability and flexibility. 37 - Krzysztof Burnecki, Aleksander Weron, Joseph Klafter, Marcin Magdziarz:
From solar flare time series to fractional dynamics. 38
Media access
- Thierry Peyre, Khalil Ibrahimi
, Rachid El Azouzi
:
IEEE802.16 multi-class capacity including AMC scheme and QoS differentiation for initial and bandwidth request ranging. 39 - Gino T. Peeters, Benny Van Houdt:
Improved high maximum stable throughput FCFS tree algorithms with interference cancellation. 40
Polling
- Onno J. Boxma, A. C. C. van Wijk, Ivo J. B. F. Adan:
Polling systems with a gated/exhaustive discipline. 41 - Paul Beekhuizen, T. J. J. Denteneer, J. A. C. Resing:
End-to-end delays in polling tree networks. 42 - Marko A. A. Boon
, Ivo J. B. F. Adan, Onno J. Boxma:
A two-queue polling model with two priority levels in the first queue. 43 - T. J. M. Coenen, J. L. van den Berg, Richard J. Boucherie
:
Analysis of a polling system modeling QoS differentiation in WLANs. 44
Stochastic models in physics II
- Igor M. Sokolov, Ariel Lubelski, Joseph Klafter:
Nonergodicity mimicking inhomogeneity in single particle tracking. 45 - Marcin Magdziarz, Aleksander Weron:
Stochastic representations of anomalous diffusion processes: subordination approach. 46 - Joseph Klafter, Igor M. Sokolov:
Field-induced dispersion in subdiffusion. 47 - Aleksei V. Chechkin:
Heavy tailed Lévy random motions in super- and subharmonic potential wells. 48
Queueing I
- Matthieu Jonckheere
:
Stability of two interfering processors with load balancing. 49 - Samuli Aalto
, Urtzi Ayesta:
Optimal scheduling of jobs with a DHR tail in the M/G/1 queue. 50 - Jonatha Anselmi:
A new framework supporting the bottleneck analysis of multiclass queueing networks. 51 - Peter Jacko
, José Niño-Mora
:
Admission control and routing to parallel queues with delayed information via marginal productivity indices. 52
Sporadic paper group
- Iordanis Koutsopoulos, George Iosifidis
:
Distributed resource allocation algorithms for peer-to-peer networks. 53 - Peter G. Harrison
, Naresh M. Patel, Soraya Zertal:
Response time distribution of flash memory accesses. 54 - Richard A. Hayden, Jeremy T. Bradley:
Fluid semantics for passive stochastic process algebra cooperation. 55 - Marco Beccuti
, Daniele Codetta Raiteri
, Giuliana Franceschinis, Serge Haddad:
Non deterministic repairable fault trees for computing optimal repair strategy. 56
Asymptotic methods in queueing
- Rami Atar:
A diffusion regime with nondegenerate slowdown. 57 - Rami Atar, Chanit Giat, Nahum Shimkin:
The cμ/θ rule. 58 - Dmitry Korshunov, Sergey Foss:
Bounds and moments for stationary delay in GI/GI/s queue. 59 - Kurt Majewski
:
Large deviation properties of constant rate data streams sharing a buffer with variable rate cross traffic. 60
Recent trends in Markov decision processes
- José Niño-Mora
:
An index policy for multiarmed multimode restless bandits. 61 - Eitan Altman, Yezekael Hayel, Hamidou Tembine
, Rachid El Azouzi
:
Markov decision evolutionary games with time average expected fitness criterion. 62 - Yair Carmon, Adam Shwartz
:
Eventually-stationary policies for Markov decision models with non-constant discounting. 63 - Kirill Dyagilev, Shie Mannor, Nahum Shimkin:
Efficient reinforcement learning in parameterized models: discrete parameters. 64
Queueing II
- David Raz
, Hanoch Levy, Benjamin Avi-Itzhak:
Class treatment in queueing systems: discrimination and fairness aspects. 65 - Yoni Nazarathy
, Gideon Weiss:
Positive harris recurrence and diffusion scale analysis of a push pull queueing network. 66 - Luca Bisti, Luciano Lenzini, Enzo Mingozzi, Giovanni Stea
:
Estimating the worst-case delay in FIFO tandems using network calculus. 67 - Anne Bouillard, Laurent Jouhet, Eric Thierry:
Computation of a (min, +) multi-dimensional convolution for end-to-end performance analysis. 68
2nd International ICST Workshop on NS-2 (WNS2 2008)
Simulator use
- Oleksandr Puchko, Vitaliy Tykhomyrov, Henrik Martikainen:
Link adaptation thresholds for the IEEE 802.16 base station. 69 - Tubtim Sanguanwongthong, Prawit Chumchu
:
Design and implementation of micro mobile MPLS for NS-2. 70 - Nelson Vicuña, Tania Jiménez, Yezekael Hayel:
Performance of SCTP in Wi-Fi and WiMAX networks with multi-homed mobiles. 71 - Abdulmohsen Mutairi, Uthman A. Baroudi
:
NS-2 enhancements for detailed HSDPA simulations. 72
Structural development/enhancements
- Laurent Paquereau, Bjarne E. Helvik
:
Simulation of wireless multi-* networks in NS-2. 73 - Nicola Baldo, Federico Maguolo, Marco Miozzo:
A new approach to simulating PHY, MAC and routing. 74 - Sébastien Vincent, Julien Montavont, Nicolas Montavont:
Implementation of an IPv6 stack for NS-3. 75 - Ryad Ben-El-Kezadri, Guy Pujolle, Farouk Kamoun
:
XAV: a tracing framework for exploring large network simulation outputs. 76
1st International ICST Workshop on MOdelling and DEsign of wireless mesh NETworks (MODENETs 2008)
Working session
- Xian Ni, Kun-Chan Lan, Robert A. Malaney
:
On the performance of expected transmission count (ETX) for wireless mesh networks. 77 - Periklis Chatzimisios, Paschalis Raptis, Vasileios Vitsas, Dimitrios Amanatiadis, Konstantinos Paparrizos:
Admission control for VoIP and data traffic in IEEE 802.11 WLANs. 78
3rd International ICST Workshop on Interdisciplinary Systems Approach in Performance Evaluation and Design of Computer & Communication Systems (Inter-Perf 2008)
Session 1
- Daniele Miorandi, Lidia Yamamoto:
Evolutionary and embryogenic approaches to autonomic systems. 79
Session 2
- Alonso Silva, Eitan Altman, Pierre Bernhard:
Numerical solutions of continuum equilibria for routing in dense ad-hoc networks. 80
Session 3
- Dario Bauso, Laura Giarré
, Raffaele Pesenti:
Consensus in inventory games. 81
Session 4
- Ahmad Al Hanbali, Mouhamad Ibrahim, Vilmos Simon, Endre Varga, Iacopo Carreras:
A survey of message diffusion protocols in mobile ad hoc networks. 82 - Eitan Altman, Tamer Basar, Francesco De Pellegrini:
Optimal monotone forwarding policies in delay tolerant mobile ad-hoc networks. 83 - Romain Couillet, Sebastian Wagner, Mérouane Debbah, Alonso Silva:
The space frontier: physical limits of multiple antenna information transfer. 84

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.