Blocking in a Shared Resource Environment
Citations
656 citations
Cites background from "Blocking in a Shared Resource Envir..."
...Kaufman obtained (5.2) for the lossy system W' [ 8 ]....
[...]
379 citations
Cites methods from "Blocking in a Shared Resource Envir..."
...[25] J. S. Kaufman, Blocking in a shared resource environment, IEEE Trans....
[...]
..., Kaufman [25] for a method with complexity, or Mitra et al....
[...]
...The loss probabilities satisfies can be efficiently computed; see, e.g., Kaufman [25] for a method with complexity, or Mitra et al. [26] for fast approximations....
[...]
289 citations
277 citations
274 citations
Cites background or methods from "Blocking in a Shared Resource Envir..."
...Proof: First, the operator T defined by the right side of (7) obviously maps [0, 1]" into itself....
[...]
...All solutions b* can be bounded above and below, and sometimes found, by successive ap proximation, that is, by iteratively applying the operator T s T\[b(l), ·■·, b(n)]\ mapping [0, 1]" into itself defined by the right side of (7), starting with 1 = (1,1, · · · , 1)....
[...]
...Hence, the successive ap proximation scheme (8) converges in the sense that T(2)*(l) —* L and T(2)*(l) -► U, where L = (Lu ■ ■ ■ , Ln) and U = (Ult ■ ■ ■ , U„) are lower and upper bonds, respectively, on any solution to (7), that is, L(i) s b*(i) < U(i), 1 < i < n....
[...]
...The following theorem indicates that (7) always has a...
[...]
...From (1), we see that (7) yields n polynomial equations in the n unknowns 6*(1), ■ ■ · , 6*(n)....
[...]
References
2,416 citations
854 citations
138 citations
133 citations
114 citations