Classic Operating Systems 2001
DOI: 10.1007/978-1-4757-3510-9_8
|View full text |Cite
|
Sign up to set email alerts
|

An Experimental Time-Sharing System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
39
0
1

Year Published

2003
2003
2019
2019

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 34 publications
(40 citation statements)
references
References 4 publications
0
39
0
1
Order By: Relevance
“…To this end, we adopt the Multi-level Feedback Queue (MLFQ) [10,27] to implement our ACK scheduling at the receiver side. To enforce MLFQ, PAC introduces N distinct queues to store ACK packets, which are assigned with N different priority levels.…”
Section: How To Schedule Ack Packets?mentioning
confidence: 99%
“…To this end, we adopt the Multi-level Feedback Queue (MLFQ) [10,27] to implement our ACK scheduling at the receiver side. To enforce MLFQ, PAC introduces N distinct queues to store ACK packets, which are assigned with N different priority levels.…”
Section: How To Schedule Ack Packets?mentioning
confidence: 99%
“…In decay-usage [Corbató et al, 1962], like user-fb, the user who has consumed the fewest resources is favored, but unlike strict user-fb, a user's resource usage is decayed over time. As resource usages decay, decay-usage behaves more like ps.…”
Section: Cluster Schedulingmentioning
confidence: 99%
“…Two-tiered batchactive scheduling is a restricted case of priority-based queues or classed schedulers [Corbató et al, 1962]. Classed schedulers pick from the highest non-empty class before proceeding to lower classes.…”
Section: Applying Priority-class Schedulingmentioning
confidence: 99%
“…[2] As computers became more prevalent, scientists and technologists explored ways to make large scale computing power available to more users through time sharing, experimenting with algorithms to provide the optimal use of the infrastructure, platform and applications with prioritized access to the CPU and efficiency for the end users. [3] …”
Section: Introductionmentioning
confidence: 99%