Author of the publication

Approximate analysis of asymmetric single-service prioritized token passing systems.

, , and . IEEE Trans. Commun., 39 (7): 1037-1040 (1991)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An efficient computational method for solving nonlinear matrix equation and its application in queuing analysis., , and . J. Comput. Sci. Technol., 11 (3): 272-285 (1996)Overflow constraint in hybrid nodes with movable boundary scheme., , and . Information Theory and Applications, volume 793 of Lecture Notes in Computer Science, page 296-309. Springer, (1993)Approximate analysis of asymmetric single-service prioritized token passing systems., , and . IEEE Trans. Commun., 39 (7): 1037-1040 (1991)Modeling an experimental computer communication network.. DATACOMM, page 4-11. ACM, (1973)Local Optical Distribution., and . INFOCOM, page 68-74. IEEE Computer Society, (1992)Performance Analysis of Cyclic-Priority Input Access Method for a Multicast Switch., , and . INFOCOM, page 1189-1195. IEEE Computer Society, (1991)A Design for Machines with Built-In Tolerance to Soft Errors., , , and . ITC, page 649-659. IEEE Computer Society, (1984)Moments of the First Passage Time to Overload for a Buffered Statistical Multiplexer., and . ICC (3), page 1689-1693. IEEE, (1997)Lifetime Analysis for Wireless Sensor Networks., , and . GLOBECOM, page 100-105. IEEE, (2008)Rate-distortion function for a Gaussian source model of images (Corresp.)., , and . IEEE Trans. Inf. Theory, 16 (4): 507-509 (1970)