Browsing by Keywords "Resource management"
Now showing items 1-8 of 8
-
Fair task allocation in crowdsourced delivery
(Institute of Electrical and Electronics Engineers, 2018)Faster and more cost-efficient, crowdsourced delivery is needed to meet the growing customer demands of many industries. In this work, we introduce a new crowdsourced delivery platform that takes fairness towards workers ... -
Fault tolerant control for over-actuated systems: an adaptive correction approach
(IEEE, 2016)This paper proposes an adaptive fault tolerant control allocation approach for over-actuated systems. The methodology does not utilize the control input matrix estimation to tolerate actuator faults and, therefore, the ... -
Property rights regimes and the management of resources
(Wiley-Blackwell Publishing Ltd., 1998)The property rights regime is an important link between the yield of a natural resource and the appropriation and maintenance incentives of its users. This paper discusses the theoretical background for this link and ... -
A reordering-free multipath traffic engineering architecture for DiffServ-MPLS networks
(IEEE, 2003-10)We propose a novel traffic engineering architecture for IP networks with multiprotocol label switching (MPLS) backbones. In this architecture, two (primary and secondary) label switched paths (LSPs) are established among ... -
The resource matching foundations of competitive advantage: an alternative perspective on the globalization of service firms
(Emerald Group Publishing, 2008)Purpose - The extant international service marketing literature focuses heavily on the impact of globalization on the outward process of the internationalization of service firms. The purpose of this paper is to propose ... -
Running multiple instances of the distributed coordination function for air-time fairness in multi-rate WLANs
(IEEE, 2013)Conventional multi-rate IEEE 802.11 Wireless LANs (WLANs) are associated with the so-called performance anomaly to describe the phenomenon of high bit rate nodes being dragged down by slower nodes. This anomaly is known ... -
A survey on information security threats and solutions for Machine to Machine (M2M) communications
(Academic Press Inc., 2017)Although Machine to Machine (M2M) networks allow the development of new promising applications, the restricted resources of machines and devices in the M2M networks bring several constraints including energy, bandwidth, ... -
Three management policies for a resource with partition constraints
(Cambridge University Press, 1999)Management of a bufferless resource is considered under non-homogeneous demand consisting of one-unit and two-unit requests. Two-unit requests can be served only by a given partition of the resource. Three simple admission ...