default search action
Kenneth Mitchell
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2013
- [j18]Zhefu Shi, Cory C. Beard, Kenneth Mitchell:
Analytical models for understanding space, backoff, and flow correlation in CSMA wireless networks. Wirel. Networks 19(3): 393-409 (2013) - 2012
- [j17]Zhefu Shi, Cory C. Beard, Kenneth Mitchell:
Competition, Cooperation, and Optimization in Multi-Hop CSMA Networks with Correlated Traffic. Int. J. Next Gener. Comput. 3(3) (2012) - [j16]Jiazhen Zhou, Jiang Li, Yi Qian, Sankardas Roy, Kenneth Mitchell:
Quasi-Optimal Dual-Phase Scheduling for Pigeon Networks. IEEE Trans. Veh. Technol. 61(9): 4157-4169 (2012) - [c12]Vida Ferdowsi, Kenneth Mitchell:
A time-slot and channel assignment algorithm in OFDM/TDMA wireless mesh networks. CCNC 2012: 910-915 - [c11]Jiazhen Zhou, Kenneth Mitchell, Rose Qingyang Hu, Yi Qian:
Analysis of express forwarding schemes in wireless mesh networks. ICCC 2012: 167-172 - 2011
- [c10]Zhefu Shi, Cory C. Beard, Kenneth Mitchell:
Competition, cooperation, and optimization in Multi-Hop CSMA networks. PE-WASUN 2011: 117-120 - [c9]Vida Ferdowsi, Kenneth Mitchell:
A distributed collision-free time slot and channel assignment algorithm for OFDM/TDMA wireless relay networks. WTS 2011: 1-6 - 2010
- [j15]Jiazhen Zhou, Kenneth Mitchell:
A scalable delay based analytical framework for CSMA/CA wireless mesh networks. Comput. Networks 54(2): 304-318 (2010) - [j14]Jiazhen Zhou, Jiang Li, Kenneth Mitchell:
Adaptive Scheduling of Message Carrying in a Pigeon Network. J. Ubiquitous Syst. Pervasive Networks 1(1): 29-37 (2010) - [c8]Vida Ferdowsi, Kenneth Mitchell:
The effect of channel and time-slot assignment algorithms on data loss events in OFDM/TDMA multi-hop wireless networks. WTS 2010: 1-6
2000 – 2009
- 2009
- [j13]Zhefu Shi, Cory C. Beard, Kenneth Mitchell:
Analytical models for understanding misbehavior and MAC friendliness in CSMA networks. Perform. Evaluation 66(9-10): 469-487 (2009) - 2008
- [j12]Chaitanya Garikiparthi, Appie van de Liefvoort, Kenneth Mitchell:
Busy period analysis of finite QBD processes. SIGMETRICS Perform. Evaluation Rev. 36(2): 98-100 (2008) - 2007
- [j11]S. P. Kim, Kenneth Mitchell:
An analytic model of TCP performance over multi-hop wireless links with correlated channel fading. Perform. Evaluation 64(6): 573-590 (2007) - [c7]Chaitanya Garikiparthi, Appie van de Liefvoort, Kenneth Mitchell:
Sample Path Analysis of Busy Periods and Related First Passages of a Correlated MEP/MEP/1 System. QEST 2007: 277-286 - [c6]Jiazhen Zhou, Kenneth Mitchell:
A Delay Based Multipath Optimal Route Analysis for Multi-hop CSMA/CA Wireless Mesh Networks. ITC 2007: 471-482 - [c5]Zhefu Shi, Cory C. Beard, Kenneth Mitchell:
Misbehavior and MAC Friendliness in CSMA Networks. WCNC 2007: 355-360 - [c4]Jiazhen Zhou, Kenneth Mitchell:
A Single Node Decomposition Based Analytic Model for Multiclass Route Optimization in Wireless Mesh Networks. WCNC 2007: 3996-4001 - 2006
- [j10]Armin Heindl, Kenneth Mitchell, Appie van de Liefvoort:
Correlation bounds for second-order MAPs with application to queueing network decomposition. Perform. Evaluation 63(6): 553-577 (2006) - 2005
- [j9]Amit Sinha, Kenneth Mitchell, Deep Medhi:
Network game traffic: A broadband access perspective. Comput. Networks 49(1): 71-83 (2005) - [j8]Jayesh Kumaran, Kenneth Mitchell, Appie van de Liefvoort:
A spectral approach to compute performance measures in a correlated single server queue. SIGMETRICS Perform. Evaluation Rev. 33(2): 12-14 (2005) - 2004
- [j7]Jayesh Kumaran, Kenneth Mitchell, Appie van de Liefvoort:
Characterization of the departure process from an ME/ME/1 queue. RAIRO Oper. Res. 38(2): 173-191 (2004) - 2003
- [j6]Kenneth Mitchell, Appie van de Liefvoort:
Approximation models of feed-forward G/G/1/N queueing networks with correlated arrivals. Perform. Evaluation 51(2/4): 137-152 (2003) - [c3]Armin Heindl, Kenneth Mitchell, Appie van de Liefvoort:
The Correlation Region of Second-Order MAPs with Application to Queueing Network Decomposition. Computer Performance Evaluation / TOOLS 2003: 237-254 - 2002
- [j5]Kenneth Mitchell, Appie van de Liefvoort:
Transient analysis of packet discarding policies in ATM networks with correlated arrivals. Perform. Evaluation 48(1/4): 47-66 (2002) - 2001
- [j4]Kenneth Mitchell, Appie van de Liefvoort, Jerry Place:
The effects of correlated arrivals at a server with credit-based traffic policing. Int. J. Commun. Syst. 14(4): 393-405 (2001) - [j3]Kenneth Mitchell, Khosrow Sohraby, Appie van de Liefvoort, Jerry Place:
Approximation models of wireless cellular networks using moment matching. IEEE J. Sel. Areas Commun. 19(11): 2177-2190 (2001) - [j2]Kenneth Mitchell:
Constructing a correlated sequence of matrix exponentials with invariant first-order properties. Oper. Res. Lett. 28(1): 27-34 (2001) - [c2]Kenneth Mitchell, Khosrow Sohraby:
An Analysis of the Effects of Mobility on Bandwidth Allocation Strategies in Multi-Class Cellular Wireless Networks. INFOCOM 2001: 1005-1011 - 2000
- [c1]Kenneth Mitchell, Khosrow Sohraby, Appie van de Liefvoort, Jerry Place:
Approximation Models of Wireless Cellular Networks Using Moment Matching. INFOCOM 2000: 189-197
1990 – 1999
- 1998
- [j1]Kenneth Mitchell, Appie van de Liefvoort, Jerry Place:
Correlation properties of the token leaky bucket departure process. Comput. Commun. 21(11): 1010-1019 (1998)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-29 22:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint