Results 131 to 140 of about 9,663,355 (323)
Large number of queues in tandem: Scaling properties under back-pressure algorithm [PDF]
Alexander Stolyar
openalex +2 more sources
A Study on the Client’s Charter in the Teluk Wanjah Dental Clinic, Kedah [PDF]
The objective of this study was to evaluate compliance to the clients' charter in a dental clinic and factors that may affect the updating of the charter.
Loke, Shuet Toh, Roslan, Husniyati
core
Bounded-Degree Graphs have Arbitrarily Large Queue-Number [PDF]
David R. Wood
openalex +1 more source
UTILITY 1 SERVER ON QUEUE SERVICE (STUDY: BANK ACCOUNT NUMBER CONVERSION)
Johan Alfian Pradana
openalex +2 more sources
Simulation of the space station information system in Ada [PDF]
The Flexible Ada Simulation Tool (FAST) is a discrete event simulation language which is written in Ada. FAST has been used to simulate a number of options for ground data distribution of Space Station payload data. The fact that Ada language is used for
Spiegel, James R.
core +1 more source
This research investigated a single bulk server queuing model where service modes and server vacations are dependent on the number of clients. The server operates in three different service modes: single service, fixed batch service, and variable batch ...
Subramani Palani Niranjan +2 more
doaj +1 more source
Dimensioning the Optimal Number of Parallel Service Desks in the Passenger Handling Process at Airports Considered as a Queueing System—Case Study [PDF]
Edina Jenčová +2 more
openalex +1 more source
Tasks may be planned for execution on a single processor or are split up by the designer for execution among a plurality of signal processors. The tasks are modeled using a design aid called a precedence graph, from which a dependency table and a ...
Cheetham, John +3 more
core +1 more source
Data Sharing and Information Security Under the Software‐Defined Network
To sum up, the big data sharing platform based on SDN can quickly and effectively respond to the data requests of end users, and the information security protection system can detect the platform in real time to prevent it from being intruded and damaged, which largely protects the information security of the platform." cd_value_code="text Abstract ...
Jianqiao Sheng +5 more
wiley +1 more source

