Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Kelly's LAN model revisited., , and . SIGMETRICS Perform. Evaluation Rev., 29 (3): 28-29 (2001)Threshold policies for single-resource reservation systems., and . SIGMETRICS Perform. Evaluation Rev., 28 (4): 9-10 (2001)Ideal preemptive schedules on two processors., , and . Acta Inf., 39 (8): 597-612 (2003)An Approximate Model of Processor Communication Rings Under Heavy Load., , , and . Inf. Process. Lett., 64 (2): 61-67 (1997)Insertion and Compaction Algorithms in Sequentially Allocated Storage., and . SIAM J. Comput., 13 (3): 600-609 (1984)Bin Packing: Maximizing the Number of Pieces Packed., , and . Acta Inf., (1978)Efficient performance analysis of asynchronous systems based on periodicity., , and . CODES+ISSS, page 225-230. ACM, (2005)A Survey of Mathematical Results in Flow-Time Scheduling for Computer Systems.. GI Jahrestagung, volume 1 of Lecture Notes in Computer Science, page 25-46. Springer, (1973)An empirical study of the behavior of programs in a paging environment., and . SOSP, ACM, (1967)Computer scheduling methods and their countermeasures., and . AFIPS Spring Joint Computing Conference, volume 32 of AFIPS Conference Proceedings, page 11-21. Thomson Book Company, Washington D.C., (1968)