[หนังสือ][B] Deterministic network calculus: From theory to practical implementation

A Bouillard, M Boyer, E Le Corronc - 2018 - books.google.com
Deterministic network calculus is a theory based on the (min, plus) algebra. Its aim is to
compute worst-case performance bounds in communication networks. Our goal is to provide …

{SmartCuckoo}: a fast and {Cost-Efficient} hashing index scheme for cloud storage systems

Y Sun, Y Hua, S Jiang, Q Li, S Cao, P Zuo - 2017 USENIX Annual …, 2017 - usenix.org
Fast query services are important to improve overall per-formance of large-scale storage
systems when handling a large number of files. Open-addressing cuckoo hash schemes …

Adversarial queuing on the multiple access channel

BS Chlebus, DR Kowalski, MA Rokicki - ACM Transactions on …, 2012 - dl.acm.org
We study deterministic broadcasting on multiple access channels when packets are injected
continuously. The quality of service is considered in the framework of adversarial queuing …

Stability of FIFO networks under adversarial models: State of the art

V Cholvi, J Echagüe - Computer Networks, 2007 - Elsevier
Network stability is an important issue that has attracted the attention of many researchers in
recent years. Such interest comes from the need to ensure that, as the system runs for an …

Maximum throughput of multiple access channels in adversarial environments

BS Chlebus, DR Kowalski, MA Rokicki - Distributed Computing, 2009 - Springer
We consider deterministic distributed broadcasting on multiple access channels in the
framework of adversarial queuing. Packets are injected dynamically by an adversary that is …

Instability of FIFO at arbitrarily low rates in the adversarial queueing model

R Bhattacharjee, A Goel, Z Lotker - SIAM Journal on Computing, 2005 - SIAM
We study the stability of the commonly used packet forwarding protocol, FIFO (first in first
out), in the adversarial queueing model. We prove that FIFO can become unstable, ie, lead …

New stability results for adversarial queuing

Z Lotker, B Patt-Shamir, A Rosén - Proceedings of the Fourteenth …, 2002 - dl.acm.org
We consider the model of" adversarial queuing theory" for packet networks introduced by
Borodin et al. 6. We show that the scheduling protocol First-In-First-Out (FIFO) can be …

Mitigating asymmetric read and write costs in cuckoo hashing for storage systems

Y Sun, Y Hua, Z Chen, Y Guo - 2019 USENIX Annual Technical …, 2019 - usenix.org
In storage systems, cuckoo hash tables have been widely used to support fast query
services. For a read, the cuckoo hashing delivers real-time access with $ O (1) $ lookup …

Instability of FIFO in the permanent sessions model at arbitrarily small network loads

M Andrews - ACM Transactions on Algorithms (TALG), 2009 - dl.acm.org
Instability of FIFO in the permanent sessions model at arbitrarily small network loads Page 1 33
Instability of FIFO in the Permanent Sessions Model at Arbitrarily Small Network Loads MATTHEW …

Stability preserving transformations: Packet routing networks with edge capacities and speeds

A Borodin, R Ostrovsky, Y Rabani - Journal of Interconnection …, 2004 - World Scientific
In the context of an adversarial input model, we consider the effect on" universal" stability
results when edges in packet routing networks can have capacities and speeds/slowdowns …