2014 International Conference on Computer, Communications, and Control Technology (I4CT) 2014
DOI: 10.1109/i4ct.2014.6914136
|View full text |Cite
|
Sign up to set email alerts
|

Markov-modulated Bernoulli-based performance analysis for BLUE algorithm under bursty and correlated traffics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…In the second row of Figure 5, there are A(2) processes sampled by two elementary slots. Furthermore, the third row contains an example of sampling by 8 elementary slots, which is defined by the process A (8). In all three examples, we see the course of events typical for stationary processes (with intensities λ avg = 0.8 p/ts, 4 p/ts and 7.2 p/ts).…”
Section: Bernoulli Processmentioning
confidence: 97%
See 1 more Smart Citation
“…In the second row of Figure 5, there are A(2) processes sampled by two elementary slots. Furthermore, the third row contains an example of sampling by 8 elementary slots, which is defined by the process A (8). In all three examples, we see the course of events typical for stationary processes (with intensities λ avg = 0.8 p/ts, 4 p/ts and 7.2 p/ts).…”
Section: Bernoulli Processmentioning
confidence: 97%
“…In Reference [7], the Markov-modulated Bernoulli process model is used to analyze the delay experienced by messages in clocked, packed-switched Banyan networks with k × k output-buffered switches. In Reference [8], when modeling bursty and correlated traffics, the authors use the two-state Markov-modulated Bernoulli arrival process. In Reference [9] four-dimensional, discrete-time Markov chain development is described and used for the performance analysis of leaky bucket algorithms.…”
Section: Related Workmentioning
confidence: 99%
“…Step one (initialize the parameters setting): GB-MMBP-2 required settings of many parameters as seen in Table 2. GB usesa threshold value as 60% of the buffer size as those in (Saaidah et al, 2014;Abdel-Jaber et al, 2007a;Al-Diabat et al, 2012). Initially, the queue length is empty, which means the initial value of queue length is zero and the packet will be arrived initially to state 1, thus the initial state is state 1.…”
Section: Fig 2 Gb Using Mmbp-2mentioning
confidence: 99%
“…Image registration is a fundamental operation in image analysis. It has been widely used in many applied fields, [1][2][3][4][5] including remote sensing, computer vision, medical image processing, and robotics.…”
Section: Introductionmentioning
confidence: 99%