Academic literature on the topic 'Admission control'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Admission control.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Admission control"
Breslau, Lee, Edward W. Knightly, Scott Shenker, Ion Stoica, and Hui Zhang. "Endpoint admission control." ACM SIGCOMM Computer Communication Review 30, no. 4 (October 2000): 57–69. http://dx.doi.org/10.1145/347057.347400.
Full textKelly, F. P., P. B. Key, and S. Zachary. "Distributed admission control." IEEE Journal on Selected Areas in Communications 18, no. 12 (December 2000): 2617–28. http://dx.doi.org/10.1109/49.898741.
Full textMortier, R., I. Pratt, C. Clark, and S. Crosby. "Implicit admission control." IEEE Journal on Selected Areas in Communications 18, no. 12 (December 2000): 2629–39. http://dx.doi.org/10.1109/49.898743.
Full textYang, Jui-Pin. "Stateless Fair Admission Control." SIMULATION 87, no. 3 (September 14, 2010): 253–61. http://dx.doi.org/10.1177/0037549710383610.
Full textHaas, Zygmunt. "Adaptive admission congestion control." ACM SIGCOMM Computer Communication Review 21, no. 5 (October 1991): 58–76. http://dx.doi.org/10.1145/122431.122436.
Full textSalles, R. M., and J. A. Barria. "Proportional Differentiated Admission Control." IEEE Communications Letters 8, no. 5 (May 2004): 320–22. http://dx.doi.org/10.1109/lcomm.2004.827384.
Full textMenth, Michael, Stefan Kopf, Joachim Charzinski, and Karl Schrodi. "Resilient network admission control." Computer Networks 52, no. 14 (October 2008): 2805–15. http://dx.doi.org/10.1016/j.comnet.2008.05.016.
Full textMisic, J., K. L. Chan, and V. B. Misic. "Admission Control in Bluetooth Piconets." IEEE Transactions on Vehicular Technology 53, no. 3 (May 2004): 890–911. http://dx.doi.org/10.1109/tvt.2004.827154.
Full textÖrmeci, E. Lerzan, and Apostolos Burnetas. "Admission control with batch arrivals." Operations Research Letters 32, no. 5 (September 2004): 448–54. http://dx.doi.org/10.1016/j.orl.2004.01.001.
Full textBlum, Avrim, Adam Kalai, and Jon Kleinberg. "Admission Control to Minimize Rejections." Internet Mathematics 1, no. 2 (January 2004): 165–76. http://dx.doi.org/10.1080/15427951.2004.10129085.
Full textDissertations / Theses on the topic "Admission control"
Sandqvist, Mattias, and Robert Johansson. "Implementation av Network Admission Control." Thesis, Jönköping University, JTH, Computer and Electrical Engineering, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-901.
Full textThis examination work is about implementation of Cisco Systems Network Admission Control (NAC) within a leading IT-company in region of Jönköping. NAC is a technique that is used for securing the internal network from the inside. NAC can verify that the client who connects to the network has the latest antivirus updates and latest operative system hotfixes. Clients who don’t meet the criteria can be placed in quarantine VLAN where they only have access to the update servers. There are also functions that handle VLAN assignment for users.
The assignment where to produce a solution for an implementation of NAC in the company’s computer network. The questions that where asked are the following, if and how could NAC be implemented in the company’s computer network.
An analysis where made of the company’s computer network, to see if the computer network meet the requirements for implementing NAC. The result of this analysis showed that there where a loss of functions needed for a working NAC solution. The computer network where rebuild from scratch to meet the new demands for NAC. After completion of the new computer network the NAC solution were taking shape. This was made in consultation with the company to get a clear picture of the needs. The result of the discussion lead to a so called “Out-of-band virtual gateway” solution. The solution builds on that the client is placed in an authentication VLAN when connecting to the computer network, after that an authentication process begins. During this process the client is checked to verify that the criteria’s are fulfilled, if so the client is moved to his access VLAN.
These solutions increase the internal security in the computer network and reduce the risks for virus spreading within the network.
Jaising, Rahul. "Measurement Based Connection Admission Control." NCSU, 2002. http://www.lib.ncsu.edu/theses/available/etd-09152002-022405/.
Full textJayaraman, Deepa. "IP multicast admission control for IPTV." Thesis, Wichita State University, 2012. http://hdl.handle.net/10057/5400.
Full textThesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical and Computer Science Engineering
Ho, Chi-Jui. "Call admission control in cellular networks." Diss., Georgia Institute of Technology, 1992. http://hdl.handle.net/1853/15730.
Full textDimitriou, Nikos. "Call admission control for multimedia CDMA." Thesis, University of Surrey, 2000. http://epubs.surrey.ac.uk/930/.
Full textDutkiewicz, Eryk. "Connection admission control in ATM networks /." Title page, abstract and contents only, 1991. http://web4.library.adelaide.edu.au/theses/09SM/09smd976.pdf.
Full textJiao, QingZhong. "Admission control and congestion control in ATM/CDMA network." Thesis, Connect to online version, 1995. http://0-wwwlib.umi.com.mercury.concordia.ca/cr/concordia/fullcit?pMQ90887.
Full textKroeger, Robert. "Admission Control for Independently-authored Realtime Applications." Thesis, Waterloo, Ont. : University of Waterloo, 2004. http://etd.uwaterloo.ca/etd/rjkroege2004.pdf.
Full text"A thesis presented to the University of Waterloo in fulfilment of the thesis requirement for the degree of Doctor of Philosophy in Computer Science". Includes bibliographical references.
Más, Ivars Ignacio. "Probe-based admission control in IP networks." Licentiate thesis, KTH, Microelectronics and Information Technology, IMIT, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-1571.
Full textThe current Internet design is based on a besteffortservice, which combines high utilization of network resourceswith simplicity. As a consequence of this design, the Internetis unable to provide guaranteed or predictable quality ofservice (QoS), required to offer realtime services thathave constraints on endtoend delay, delay jitterand packet loss.
To add QoS capabilities to the present Internet, newfunctions need to be simple to implement, while allowing highnetwork utilization. In recent years, different methods havebeen investigated to provide the required QoS. Most of thesemethods include some form of admission control so that newflows are only admitted to the network if the admission doesnot decrease the quality of connections that are already inprogress below some defined level. To achieve the requiredsimplicity a new family of admission control methods, calledendtoend measurementbased admission control(EMBAC) moves the admission decision to the edges of thenetwork.
This thesis presents the probebased admission control(PBAC), which belongs to the family of EMBAC schemes. PBACprovides a reliable upper bound to the packet loss probabilitya flow will suffer in the network. The delay in the network isbounded by using small, packetscale buffering in therouters. The admission control is done by measuring the lossratio of a stream of probe packets. Probe packets and datapackets of accepted flows are transmitted with low and highpriority respectively, to protect accepted flows from the loadof the probe streams. The probing is done at the peak rate ofthe connection and the flow is accepted if the probe packetloss rate is below a predefined threshold. This procedureensures that the packet loss of accepted flows is always belowthe threshold value.
The thesis offers a description of the probing procedure,with an extensive performance analysis by simulation, as wellas a mathematical model for the admission decision. The authoralso addresses the application of the admission control formulticast communications, and gives a general method to providesecurity features to measurementbased admission controlschemes.
Cheung, Michael. "Call admission control in wireless communications networks." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape4/PQDD_0016/NQ53488.pdf.
Full textBooks on the topic "Admission control"
Denise, Helfrich, ed. Cisco Network Admission Control. Indianapolis, Ind: Cisco, 2007.
Find full textOmar, Santos, and White David, eds. Cisco Network Admission Control. Indianapolis, Ind: Cisco, 2007.
Find full textGhosh, Sanchita, and Amit Konar. Call Admission Control in Mobile Cellular Networks. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-30997-7.
Full textGhosh, Sanchita. Call Admission Control in Mobile Cellular Networks. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013.
Find full textMansingh, Suhas. Call admission control for leaky bucket regulated traffic in ATM networks. Ottawa: National Library of Canada, 1997.
Find full textGarrett, Gail S. Present on admission: Gail S. Garrett. Chicago, IL: AHIMA, 2008.
Find full textPresent on admission: Gail S. Garrett. 2nd ed. Chicago, Ill: AHIMA, 2009.
Find full textGarrett, Gail S. Present on admission: Gail S. Garrett. 2nd ed. Chicago, Ill: AHIMA, 2009.
Find full textGarrett, Gail S. Present on admission: Gail S. Garrett. Chicago, IL: AHIMA, 2008.
Find full textGarrett, Gail S. Present on admission: Gail S. Garrett. Chicago, IL: AHIMA, 2008.
Find full textBook chapters on the topic "Admission control"
Ross, Keith W. "Admission Control." In Multiservice Loss Models for Broadband Telecommunication Networks, 113–53. London: Springer London, 1995. http://dx.doi.org/10.1007/978-1-4471-2126-8_4.
Full textBlum, Avrim, Adam Kalai, and Jon Kleinberg. "Admission Control to Minimize Rejections." In Lecture Notes in Computer Science, 155–64. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-44634-6_15.
Full textHsu, Ivy, and Jean Walrand. "Admission Control for ATM Networks." In Stochastic Networks, 411–27. New York, NY: Springer New York, 1995. http://dx.doi.org/10.1007/978-1-4757-2418-9_21.
Full textIvars, Ignacio Más, and Gunnar Karlsson. "PBAC: Probe-Based Admission Control." In Quality of Future Internet Services, 97–109. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45412-8_8.
Full textChen, Huan, Lei Huang, Sunil Kumar, and C. C. Jay Kuo. "Dynamic Call Admission Control Schemes." In Radio Resource Management for Multimedia QoS Support in Wireless Networks, 95–127. Boston, MA: Springer US, 2004. http://dx.doi.org/10.1007/978-1-4615-0469-6_5.
Full textIndrusiak, Leandro Soares, Piotr Dziurzanski, and Amit Kumar Singh. "Feedback-Based Admission Control Heuristics." In Dynamic Resource Allocation in Embedded, High-Performance and Cloud Computing, 25–49. New York: River Publishers, 2022. http://dx.doi.org/10.1201/9781003337997-3.
Full textAina, Folayo, Sufian Yousef, and Opeyemi Osanaiye. "Bandwidth Estimation for Admission Control in MANET: Review and Conceptual MANET Admission Control Framework." In Proceedings of the Future Technologies Conference (FTC) 2018, 651–71. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02683-7_46.
Full textNagy, Sue, and Azer Bestavros. "Concurrency Admission Control for RT Databases." In Real-Time Database and Information Systems: Research Advances, 261–86. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-1-4615-6069-2_15.
Full textNguyen, Hoang Nam. "Resource Allocation and Connection Admission Control." In Routing and Quality-of-Service in Broadband LEO Satellite Networks, 139–66. Boston, MA: Springer US, 2003. http://dx.doi.org/10.1007/978-1-4615-0249-4_6.
Full textCamarda, Pietro, and Domenico Striccoli. "Live Admission Control for Video Streaming." In Quality of Service in Multiservice IP Networks, 292–305. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-36480-3_21.
Full textConference papers on the topic "Admission control"
Breslau, Lee, Edward W. Knightly, Scott Shenker, Ion Stoica, and Hui Zhang. "Endpoint admission control." In the conference. New York, New York, USA: ACM Press, 2000. http://dx.doi.org/10.1145/347059.347400.
Full textZhong, Gangyun, Jun Li, Zhigang Li, Xin Yan, and Qilin Wu. "Numerical Investigations on Aerodynamic Performance of Nozzle Control Stage of a 600MW Steam Turbine Under Different Backing Pressure Conditions." In ASME 2011 Power Conference collocated with JSME ICOPE 2011. ASMEDC, 2011. http://dx.doi.org/10.1115/power2011-55402.
Full textFu, Xiuhua, and Jiazheng Wang. "A Unified Admission Control Algorithm." In 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). IEEE, 2008. http://dx.doi.org/10.1109/wicom.2008.59.
Full textTostes, Anna Izabel J., Fatima de L. P. Duarte-Figueiredo, and Luis E. Zarate. "Dynamic fuzzy cellular admission control." In 2013 IEEE Latin-America Conference on Communications (LATINCOM). IEEE, 2013. http://dx.doi.org/10.1109/latincom.2013.6759829.
Full textHaas, Z., and J. H. Winters. "Congestion control by adaptive admission." In IEEE INFCOM '91. The conference on Computer Communications. Tenth Annual Joint Comference of the IEEE Computer and Communications Societies Proceedings. IEEE, 1991. http://dx.doi.org/10.1109/infcom.1991.147554.
Full textAmmar, Doreid, Thomas Begin, Isabelle Guerin-Lassous, and Ludovic Noirie. "KBAC: Knowledge-Based Admission Control." In 2012 IEEE 37th Conference on Local Computer Networks (LCN 2012). IEEE, 2012. http://dx.doi.org/10.1109/lcn.2012.6423672.
Full textBrown, Timothy X. "Statistical-classification-based admission control." In ITCom 2001: International Symposium on the Convergence of IT and Communications, edited by Robert D. van der Mei and Frank Huebner-Szabo de Bucs. SPIE, 2001. http://dx.doi.org/10.1117/12.434304.
Full textKoliopoulos, K., G. Koutitas, and L. Tassiulas. "Demand Response using Admission Control." In IEEE INFOCOM 2016 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE, 2016. http://dx.doi.org/10.1109/infcomw.2016.7562225.
Full textEvangelinakis, D. I., N. D. Sidiropoulos, and A. Swami. "Joint admission and power control using branch & bound and gradual admissions." In 2010 IEEE 11th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC 2010). IEEE, 2010. http://dx.doi.org/10.1109/spawc.2010.5670899.
Full textMatskani, E., N. D. Sidiropoulos, Z. Q. Luo, and L. Tassiulas. "Joint Multicast Beamforming and Admission Control." In 2007 2nd IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing. IEEE, 2007. http://dx.doi.org/10.1109/camsap.2007.4497997.
Full textReports on the topic "Admission control"
Yavatkar, R., D. Pendarakis, and R. Guerin. A Framework for Policy-based Admission Control. RFC Editor, January 2000. http://dx.doi.org/10.17487/rfc2753.
Full textMcDysan, D. Generic Connection Admission Control (GCAC) Algorithm Specification for IP/MPLS Networks. Edited by G. Ash. RFC Editor, April 2012. http://dx.doi.org/10.17487/rfc6601.
Full textWillson. L51709 Development-Test Electronic Gas Admission for Large Bore Engines. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), August 1994. http://dx.doi.org/10.55274/r0010114.
Full textFowler. L51754 Field Application of Electronic Gas Admission with Cylinder Pressure Feedback for LB Engines. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), June 1996. http://dx.doi.org/10.55274/r0010363.
Full textYavatkar, R., D. Hoffman, Y. Bernet, F. Baker, and M. Speer. SBM (Subnet Bandwidth Manager): A Protocol for RSVP-based Admission Control over IEEE 802-style networks. RFC Editor, May 2000. http://dx.doi.org/10.17487/rfc2814.
Full textDufour, Quentin, David Pontille, and Didier Torny. Contracter à l’heure de la publication en accès ouvert. Une analyse systématique des accords transformants. Ministère de l'enseignement supérieur et de la recherche, April 2021. http://dx.doi.org/10.52949/2.
Full textInvestigation of the Relative Performance of Vaned and Vaneless Mixed Flow Turbines for Medium and Heavy-Duty Diesel Engine Applications with Pulse Exhaust Systems. SAE International, April 2021. http://dx.doi.org/10.4271/2021-01-0644.
Full text