Abstract

Part 3: Resource Allocation; International audience; There has long been a need for a robust and reliable system which distributes traffic across multiple paths. In particular such a system must rarely reorder packets, must not require per-flow state, must cope with different paths [...]

Abstract

This study analyzes the performance of a queue length-dependent overload control policy using a leaky bucket (LB) scheme. This queueing model is applied to the operation of a battery swapping and charging station for electric vehicles (EVs). In addition to the LB scheme, we propose [...]

Abstract

Recent literature has proved that stable dynamic routing algorithms have solid theoretical foundation that makes them suitable to be implemented in a real protocol, and used in practice in many different operational network contexts. Such algorithms inherit much of the properties [...]

Abstract

In the new era of Ambient Intelligence, wireless sensor networks (WSNs) are seen to bridge the gap between physical world and the Internet, making a large amount of information accessible anywhere, anytime. Over the last few years, WSNs are being developed towards a large number of [...]