Wireless 3-hop Networks with Stealing Revisited: A Kernel Approach
From MaRDI portal
Publication:6160402
DOI10.3138/INFOR.51.4.192OpenAlexW2047903689MaRDI QIDQ6160402
Hongshuai Dai, Yiqiang Q. Zhao
Publication date: 9 May 2023
Published in: INFOR: Information Systems and Operational Research (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.3138/infor.51.4.192
Related Items (2)
The kernel method tail asymptotics analytic approach for stationary probabilities of two-dimensional queueing systems ⋮ Exact tail asymptotics for a two-stage queue: Complete solution via kernel method
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- First response to letter of G. Fayolle and R. Iasnogorodski
- Tail asymptotics for a generalized two-demand queueing model -- a kernel method
- Generating functions for generating trees
- Analysis of exact tail asymptotics for singular random walks in the quarter plane
- Wireless three-hop networks with stealing. II: Exact solutions through boundary value problems
- Wireless Multihop Networks with Stealing: Large Buffer Asymptotics via the Ray Method
- Asymptotic Methods in Enumeration
- Letter to editors
This page was built for publication: Wireless 3-hop Networks with Stealing Revisited: A Kernel Approach