Bandwidth allocation in high speed networks with multiple nested charge classes
In integrated multimedia service networks, the charges for bandwidth would vary according to the nature of services provided. Maximization of revenue while maintaining QOS would be a goal for bandwidth allocation. Little attention has been paid to this aspect of network management. Here an effective...
| Main Authors: | Khalil, Ibrahim, Mohd Ali, Borhanuddin, Mukerjee, Malay R. |
|---|---|
| Format: | Conference or Workshop Item |
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/25647/ |
Similar Items
Compression of Three-Dimensional Terrain Data Using Lifting Scheme Based on Second Generation Wavelets
by: Pradhan, Biswajeet
Published: (2006)
by: Pradhan, Biswajeet
Published: (2006)
Analysis of string matching compression algorithms
by: Nadarajan, Krishnaveny, et al.
Published: (2008)
by: Nadarajan, Krishnaveny, et al.
Published: (2008)
A Comparative Study on Compression of Different Image File Formats
by: Ooi, Poh San
Published: (1999)
by: Ooi, Poh San
Published: (1999)
Improving Classification of Remotely Sensed Data Using Best Band Selection Index and Cluster Labelling Algorithms
by: Teoh, Chin Chuang
Published: (2005)
by: Teoh, Chin Chuang
Published: (2005)
Fingerprinted secret sharing steganography for robustness against image cropping attacks
by: Potdar, Vidyasagar, et al.
Published: (2005)
by: Potdar, Vidyasagar, et al.
Published: (2005)
Robust communication in differential relay protection using wireless technique
by: Badar, Malik Qasim
Published: (2015)
by: Badar, Malik Qasim
Published: (2015)
The disruptions and the opportunities in FinTech / Ilham Adli Azahar.
by: Azahar, Ilham Adli
Published: (2019)
by: Azahar, Ilham Adli
Published: (2019)
Design and analysis of a dynamic code division multiple access communication system based on tunable optical filter
by: Hamarsheh, Mohammad M. Naji, et al.
Published: (2005)
by: Hamarsheh, Mohammad M. Naji, et al.
Published: (2005)
Bandwidth allocation policy using the game theory model in heterogeneous wireless networks
by: Anwar, Farhat, et al.
Published: (2018)
by: Anwar, Farhat, et al.
Published: (2018)
Anomaly detection in large-scale data stream networks
by: Pham, DucSon, et al.
Published: (2014)
by: Pham, DucSon, et al.
Published: (2014)
Effective Anomaly detection in Sensor Network Data Streams
by: Pham, DucSon, et al.
Published: (2009)
by: Pham, DucSon, et al.
Published: (2009)
Orthogonal Frequency Division Multiple Access resource unit allocation algorithms for IEEE 802.11AX medium access control protocol
by: Zazali, Azyyati Adiah
Published: (2024)
by: Zazali, Azyyati Adiah
Published: (2024)
Energy and performance efficient resource allocation for cloud-based data centers
by: Akhter, Nasrin
Published: (2015)
by: Akhter, Nasrin
Published: (2015)
Manifold-valued data analysis of networks and shapes
by: Severn, Katie
Published: (2020)
by: Severn, Katie
Published: (2020)
Dynamic bandwidth allocation in ATM networks
by: Loh, Chee Heok
Published: (2001)
by: Loh, Chee Heok
Published: (2001)
A high gain microstrip yagi antenna with large bandwidth at frequency of 5.8 GHZ
by: Quzwain, Kamelia M. Chatib
Published: (2016)
by: Quzwain, Kamelia M. Chatib
Published: (2016)
Data Communication Network and its Delay Effect on the Dynamic Operation of Distributed Generation Units in a Microgrid
by: Setiawan, M., et al.
Published: (2014)
by: Setiawan, M., et al.
Published: (2014)
Data envelopment analysis for resource allocation problems in the presence of radial and non-radial data
by: Mirsalehy, Ali
Published: (2016)
by: Mirsalehy, Ali
Published: (2016)
Receiver bandwidth enhancement design for high speed optical system
by: Mohammad, Intan Shafinaz
Published: (2013)
by: Mohammad, Intan Shafinaz
Published: (2013)
Low power text compression using Huffman coding with power management controller
by: Mohammed, Maan Hameed
Published: (2016)
by: Mohammed, Maan Hameed
Published: (2016)
Multicast-unicast key management and data delivery method in wireless IPv6 networks
by: Zare Anari, Abbas Mehdizadeh
Published: (2012)
by: Zare Anari, Abbas Mehdizadeh
Published: (2012)
Data warehouse structuring methodologies for efficient mining of Western Australian petroleum data sources
by: Nimmagadda, Shastri, et al.
Published: (2005)
by: Nimmagadda, Shastri, et al.
Published: (2005)
Data warehousing and mining technologies for adaptability in turbulent resources business environments
by: Nimmagadda, Shastri, et al.
Published: (2011)
by: Nimmagadda, Shastri, et al.
Published: (2011)
Facilitating resource allocation decision through Bibliomining: the case of UTM's library / Md Razib Karno
by: Karno, Md Razib
Published: (2015)
by: Karno, Md Razib
Published: (2015)
Value-adding mobile payment services
Published: (2009)
Published: (2009)
An improvement algoithm for Iris classification by using Linear Support Vector Machine (LSVM), k-Nearest Neighbours (k-NN) and Random Nearest Neighbous (RNN) / Ahmad Haadzal Kamarulzalis and Mohd Asrul Affendi Abdullah
by: Kamarulzalis, Ahmad Haadzal, et al.
Published: (2019)
by: Kamarulzalis, Ahmad Haadzal, et al.
Published: (2019)
Physical characteristics of plasma monopole antenna constructed through rf charging of different gases / Nur Aina Halili
by: Halili, Nur Aina
Published: (2015)
by: Halili, Nur Aina
Published: (2015)
Understanding interpersonal data management in the home
by: Kilic, Damla
Published: (2023)
by: Kilic, Damla
Published: (2023)
Utilisation of Exponential-Based Resource Allocation and Competition in Artificial Immune Recognition System
by: Hormozi, Shahram Golzari
Published: (2011)
by: Hormozi, Shahram Golzari
Published: (2011)
Rapid flood inundation mapping using social media, remote sensing and topographic data
by: Rosser, Julian F., et al.
Published: (2017)
by: Rosser, Julian F., et al.
Published: (2017)
Performance Modelling for Mobile Cellular Network Using Queueing System
by: Basi, Hussein Muzahim Aziz
Published: (1999)
by: Basi, Hussein Muzahim Aziz
Published: (1999)
Efficient and secured compression and steganography technique in wireless sensor network
by: Tuama, Ammar Yaseen
Published: (2016)
by: Tuama, Ammar Yaseen
Published: (2016)
Provenance network analytics: an approach to data analytics using data provenance
by: Huynh, Trung Dong, et al.
Published: (2018)
by: Huynh, Trung Dong, et al.
Published: (2018)
Scheduling and bandwidth allocation in cognitive radio sensor networks
by: Al-Medhwahi, Mohammed Ahmed Ali
Published: (2018)
by: Al-Medhwahi, Mohammed Ahmed Ali
Published: (2018)
Explicating the challenges of providing novel media experiences driven by user personal data
by: Sailaja, Neelima, et al.
Published: (2018)
by: Sailaja, Neelima, et al.
Published: (2018)
Perceiving statistical knowledge through digital apps: an exploratory study / Az’lina Abdul Hadi... [et al.]
by: Abdul Hadi, Az’lina, et al.
Published: (2018)
by: Abdul Hadi, Az’lina, et al.
Published: (2018)
Frequent Lexicographic Algorithm for Mining Association Rules
by: Mustapha, Norwati
Published: (2005)
by: Mustapha, Norwati
Published: (2005)
Personal Digital Assistant (PDA) Based Client/Server Data Collection System
by: Balasubramaniam, Nagaletchumi
Published: (2004)
by: Balasubramaniam, Nagaletchumi
Published: (2004)
Developing the ZigBee Based Data Payload Coding for Data Communication in Microgrids
by: Setiawan, M., et al.
Published: (2014)
by: Setiawan, M., et al.
Published: (2014)
Ontology based data warehouse modelling - a methodology for managing petroleum field ecosystems
by: Nimmagadda, Shastri, et al.
Published: (2008)
by: Nimmagadda, Shastri, et al.
Published: (2008)
Similar Items
-
Compression of Three-Dimensional Terrain Data Using Lifting Scheme Based on Second Generation Wavelets
by: Pradhan, Biswajeet
Published: (2006) -
Analysis of string matching compression algorithms
by: Nadarajan, Krishnaveny, et al.
Published: (2008) -
A Comparative Study on Compression of Different Image File Formats
by: Ooi, Poh San
Published: (1999) -
Improving Classification of Remotely Sensed Data Using Best Band Selection Index and Cluster Labelling Algorithms
by: Teoh, Chin Chuang
Published: (2005) -
Fingerprinted secret sharing steganography for robustness against image cropping attacks
by: Potdar, Vidyasagar, et al.
Published: (2005)