Abstract
The use of wireless communications in industrial applications has motivated various advances in manufacturing automation by allowing more flexibility in installing wireless sensors and actuators than their wired counterparts. The main challenge in industrial wireless deployment is the strict timing and reliability requirements in these systems. Industrial wireless networks are commonly characterized by strict packet deadlines. As a result, Time Division Multiple Access (TDMA) protocols have been widely exploited in various technologies due to their ease of implementation and packet collision avoidance. Moreover, the use of frame-based protocols is motivated by the need for short processing times at the edge nodes of the network. In this work, we consider the problem of scheduling multiple data flows over a wireless network operating in an industrial environment. These flows are characterized by random strict deadlines for each packet following a given probability distribution. Each of these flows may represent the data coming from a sensor to the controller or the control commands from the controller to an actuator. A randomized frame-based scheduling scheme is analyzed where each time slot in the frame is assigned to a data flow randomly.
1. Introduction
Wireless communications technology is a key enabler of advances in various applications due to its better coverage, more flexibility, and massive connectivity. Better coverage is achieved because wireless signals can cover locations where wires cannot reach either due to the long distances or a harsh environment. Different applications have different requirements and different performance indicators. Industrial wireless is motivated to allow better process and factory automation where more communications devices can be installed and larger amounts of data can be transferred.
Due to the criticality of the data transfered in many industrial environments, industrial wireless has strict requirements on the delay and reliability of the transferred data. Consequently, industrial wireless protocols are developed to meet these requirements. Examples of wireless protocols for process automation include wireless Highway Addressable Remote Transducer Protocol (WirelessHART) and the International Society of Automation (ISA) protocol ISA100.11a [1, 2] and for factory automation include wireless communications with ultra-high performance protocol (WirelessHP) [3].
Specifically, strict packet deadlines are required in industrial wireless networks. The stochastic and broadcast nature of the wireless channels can cause data errors. As a result, packets may be lost or may have to be retransmitted, which cause delays. Hence, improving transmission control schemes in industrial wireless has been extensively studied for transmission of packets with strict deadlines [4]–[7].
In order to overcome the challenges of the broadcast nature of the wireless channel, time division multiple access (TDMA)-based medium access control (MAC) protocols are used to avoid packet collisions. Generally, TDMA-based MAC protocols allow the control of the transmitted packets in any time slot, and hence, the network can achieve bounded transmission delay [8]. TDMA-based MAC is used in industrial wireless to eliminate the possibility of packet collision and hence it increases the likelihood of packets getting delivered by their deadlines.
In TDMA-based networks, scheduling plays a crucial rule in the network performance by determining the packets to be transmitted at any given time slot. Moreover, scheduling can improve reliability by allowing multiple copies of data to be transmitted over the network. As a result, scheduling has been widely discussed to achieve the requirements of wireless sensor networks (WSN). In [9], scheduling in TDMA-based networks is addressed where various performance metrics are discussed including latency and energy consumption. Additionally, the network parameters that impact the scheduling algorithms are studied. Heuristic scheduling algorithms have been surveyed in [10].
In this work, we consider a randomized frame-based scheduling policy for multiple data flows with strict deadlines. In the proposed scheduling policy, each time slot is assigned to a flow following some probability distribution. In existing industrial wireless communications protocols, the schedule is commonly evaluated once every transmission frame composed of many time slots. The distribution of the transmission probabilities and the schedule may be re-evaluated at the beginning of each new frame. The route of each data flow is assumed to be known before the schedule is evaluated. The data flows are not assumed to be periodic. Instead, the packet generation process and packet deadlines are assumed to be probabilistic with some defined probability mass functions. A similar model is previously considered in [11] for the case of a deterministic scheduling policy obtained by solving a Markov decision problem.
The consideration of data flows with random deadlines is motivated by eventbased signals that may be affected by random events or random processing delays. In [12]–[15], the concept of data flows with random deadlines is discussed. In this paper, we use random deadlines in a different setting compared to the existing literature and we also consider the effects of the wireless channel.
In this work, a randomized scheduling policy is presented and the average number of packets missing their deadlines per frame is derived. The ability of the scheduler to achieve a required performance metric for a set of flows is discussed. Numerical methods are used to assess the performance of the scheduling policy for various parameter settings.
The rest of the paper is organized as follows. We introduce the network model in Section 2. The performance analysis is presented in Section 3. The performance optimization through formulating the minimization problem of the packets missing their deadlines is discussed in Section 4. Numerical results are presented in Section 5. Finally, Section 6 presents the concluding remarks.
2. System Model
We denote the M flows in a wireless network by . These flows are to be scheduled over a single frequency bands. The mth flow has a predefined route ϕm with a number of hops . In Fm, each packet should be delivered over all the hops successfully before it gets to its destination. The flow Fm has a new packet when the deadline of the previous packet expires.
The scheduling frame has a fixed length of T time slots. The scheduling frame length is commonly defined in the literature as the least common multiple of the packet generation periods of the field devices [16]. This definition is valid only in the case of periodic data flows. The value of T is commonly referred to as a hyper-period in industrial wireless networks protocols. In each time slot, at most one transmission occurs, as we assume a single wireless frequency band is used.
The wireless link between any two nodes in the network modeled as a binary erasure channel. It is represented by the success transmission probability ρi,j between the nodes i and j. We assume that ρi,j = ρ, for all (i,j), for the sake of simplicity even though the proposed algorithms can still be analyzed in the more general case with different values for ρi,j. The value of ρ is determined by the wireless channel and the wireless nodes parameters such as required error rate, the transmission power, and the modulation and coding scheme. The state of the wireless channel is independent of the packet generation process.
Each packet in Fm is characterized by a required deadline for delivery to the destination which is denoted by Dm. The parameter Dm is modeled as positive integer random variable. The values of Dm are denoted by and drawn from the set , where is finite. The probability mass function of Dm is denoted by fm(.) with the mean µm and the variance . The deadlines are strict such that a packet is discarded if not successfully received at the destination prior to its deadline. Each packet is generated and released as the deadline of the previous packet in the same flow expires.
We assume that a network manager takes the role of the schedule generation at the beginning of the hyper-period. The hyper-period takes a fixed value which long enough compared to the average packet deadlines to have a negligible scheduling processing overhead.
In this paper, we exploit the ratio of the average number of packets missing their deadlines to the average number of packets generated in a hyper-period as the performance metric to evaluate the performance of a randomized scheduling policy. The obtained performance can be compared to a preset value for schedulability testing or admission control.
3. Performance Analysis
In this section, we analyze the network performance of a randomized scheduling policy. The performance criterion is the average number of packets missing their deadlines in a hyper-period. The first step is evaluating the probability of a packet to miss its deadline. Then, the stochastic packets arrival process is defined and studied to determine the average number of packets missing their deadlines over the wireless network.
3.1. Probability of a Packet Missing Its Deadline
We consider a randomized scheduling policy which is characterized by the transmission probabilities for various flows. At a time slot, the flow Fm is to be scheduled for transmission by the probability pm. The values of pm are set based on various system characteristics. These values are constrained by because only a single flow is scheduled at each time slot and hence the transmission decision of a flow has to follow a probability mass function.
We define qm(tm, hm, pm) as the probability of a packet in Fm to miss its deadline if it has hm hops remaining in its route and tm time slots remaining before its deadline expires given that the probability for a packet to be scheduled for transmission is pm. In order to evaluate qm(tm, hm, pm), we list the three events that may occur to a packet in Fm at any time slot. These events are the packet is transmitted and successfully received, the packet is transmitted but fails to reach the following node in its route, and the packet is not scheduled. As a result, the value of qm(tm, hm, pm) is expressed through evaluating the probability not to have hm successful transmissions in the following tm time slots as follows
| (1) |
Equation (1) is calculated only in cases where hm ≤ tm where the corresponding packets have not missed their deadlines yet. The initial conditions of the flow states, including the number of remaining hops and the remaining time slots of the flow packets while the schedule is being built, are not considered in this analysis because of their negligible effects on performance. The proposed policy is randomized and the hyper-period is long enough compared to the average packet deadlines such that the packets at the start and the end of the observation interval has negligible effect compared to the total number of missed packets.
Finally, we obtain the average probability of a packet in the flow Fm to miss its deadline given that the scheduling probability is pm. During the schedule evaluation, the exact states of the flows are not known to the network manager because we use frame-based scheduling where the schedule is determined before the frame transmission. As a result, the average probability is calculated at the arrival instant of the packet where the value of the deadline at the arrival instant is not known and follows the random distribution fm(.). The average probability is expressed as follows
| (2) |
3.2. Average Number of Packets Missing their Deadlines
In the following, we evaluate the average number of packets missing their deadlines of each flow during T. We start by introducing the random variable Xm which depicts the number of packets of Fm that are generated within T. Also, we set the random sequence to represent the sequence of deadlines of x packets of the flow Fm within T. We denote the sum of the elements of this random sequence by and we express it as follows
| (3) |
The limiting values of Xm are then evaluated using the limiting values of the random variable Dm. When all the packet of Fm have the maximum deadline, the number of packet generated within T is minimum such that
| (4) |
where is the ceiling function. On the other hand when all packets have the minimum deadline, which equals , the maximum value of the random variable Xm occurs. As a result, this maximum value is calculated as
| (5) |
The probability distribution of Xm is then calculated. The event {Xm = xm} happens when the deadlines of the first xm − 1 packets of are summed to a value below T while the deadlines of the first xm packets are summed to be greater than or equal to T. The probability of this event is denoted by Pr(Xm = xm) and evaluated as follows
| (6) |
This same event can also be represented by having all the events in which takes values between 0 to T − 1 and the deadline of the xmth packet is greater than or equal to . The sum of the probabilities of the corresponding events defines the case in which the xmth packet is the last packet of the flow Fm. The expression of Pr(Xm = xm) can be stated also as follows
| (7) |
By independence of the deadlines of the packets of the same flow, we are able multiply the probabilities of the two independent events in the above expression to obtain their joint probability expression. In order to calculate the probability of the last packet deadline to be greater than or equal to T−l, we use the deadline probability distribution as follows
| (8) |
Then using the independence of the packets’ deadlines, , the expression in (7) can be evaluated as
| (9) |
Furthermore, the is calculated using the deadline probability distribution as follows
| (10) |
where is a random sequence of length xm − 1 where the sum of all its packets’ deadlines equals l. Hence, the sum in the above expression includes all the combinations of the packets’ deadlines of Fm that lead to this value.
As a result, the average number of packets missing their deadlines in the flow Fm is evaluated by obtaining the sum of probabilities of all the packets in Fm to miss their deadlines over the distribution of Xm. These events of packets missing their deadlines in Fm are independent of each other with average probability of . Thus, the average number of packets missing their deadlines is expressed as follows
| (11) |
By rearranging the terms in the sums, the expression is evaluated as follows
| (12) |
Moreover, the average number of packets missing their deadlines in all the M flows over T is expressed as follows
| (13) |
On the other hand, the average number of all packets generated by all the flows over T is calculated as follows
| (14) |
Finally, the ratio of the average number of packets missing their deadlines to the average number of generated packets is evaluated as follows
| (15) |
where E[Xm] is the expected value of Xm.
This obtained ratio can generally be used for admission control when a randomized scheduling policy is employed for flow scheduling. If M − 1 flows have been admitted into the network and the value of RMissed is calculated to be less than or equal to a prescribed threshold, such as 10%. Upon arrival of the M th flow, the ratio RMissed is computed again to decide about admitting this flow to the network. If it does not exceed 10%, the new flow is admitted.
In addition, the value of RMissed for any given choice of {pm : m = 1, …, M } serves as an upper bound to the value of RMissed for the optimal randomized schedule. The optimal value typically can be found by minimizing RMissed over all possible distributions {pm : m = 1, …, M.}However, this obtained upper bound may be loose.
4. Minimization of RMissed
In this section, we consider the problem of minimizing RMissed over the values of decision probabilities pm. The minimization problem is stated as follows
| (16) |
The denominator of RMissed is independent of pm and hence it can be removed from the optimization problem to restate it as
| (17) |
We then substitute for from (2) and denote E[Xm] by Wm which is independent of pm.
| (18) |
where Wm represents the average number of packets of FM generated in a hyperperiod which depends only on the deadline distribution and not on the transmission probabilities.
The optimization problem is finally rewritten substituting from (1). The objective function is a positive non-convex polynomial function of degree .
| (19) |
In the following, we apply a generalization of Lagrange duality theory to relax the constrained minimization problems with non-convex objective functions. In this generalization, the Lagrange multiplier terms are nonlinear combinations of the constraints. Later, the upper bound of the objective function is obtained through solving a semidefinite programming (SDP) problem [17, 18] through a sum-of-squares (SOS) optimization algorithm [19].
We start by defining the function to include all the terms depending on pm in the objective function.
| (20) |
The Lagrange dual problem is obtained by using nonlinear Lagrange multipliers, namely, λ(pm) and δm(pm).
| (21) |
In order to deploy the SOS method, we bound the minimum objective function by a variable γ in polynomial time and try to find a tight bound for the objective function [20]. In [21], it was shown that a nested family of SDP relaxations can produce the exact minimum while the degree of the polynomial can be exponential with the number of variables. It was observed that a low order relaxation usually produces the optimal solution. Note that in (20) the functions Gm(pm) are polynomials in the transmission probabilities pm. We set the following problem which converges to the optimal value of (20). The objective function of (22) is the bound for the objective function of (20). This problem is then relaxed using the SOS optimization in order to get a close to optimal solution.
| (22) |
The relaxed problem can be written as follows where the polynomial constraint of (22) is constrained in (23) to be SOS.
| (23) |
The optimization variables are γ and the polynomial coefficients of λ(pm) and δm(pm). Let d be the degree of the polynomial of the first constraint in (23) where for a fixed value of d, the problem is solved using SDP. By increasing d, the SDP size increases and the obtained value of γ is tighter to the optimal value. The initial value of d is selected to be the nearest even number greater than or equal to the degree which is . The degree is then increased by 2 for each following level.
To check that the objective bound has converged to the optimal value, the following test is performed using the GloptiPoly tool [22]. The test checks the non-negativity of a polynomial over a semi-algebraic set through finding a sequence of moments to represent a probability measure with support in this semi-algebraic set. A sufficient rank evaluation is performed over the moment matrix which is a positive semidefinite matrix formed by the sequence of moments [19].
In summary, the following algorithm is used to obtain the optimal solution of the minimization problem.
5. Numerical Results
In this section, the performance of the proposed randomized scheduling algorithm is assessed in the case of multiple flows with packets having random deadlines. The performance criterion is RMissed. In the following, we demonstrate the performance of the optimal strategy using various system parameters. Moreover, the performance of the optimal randomized policy is compared to the basic round robin benchmark in which flows are scheduled over time in equal proportions and in circular order without prioritizing any of the flows [23]. We will refer to these strategies, respectively, as ‘Optimal’ and ‘RR’.
In the case of symmetric flows, all the M flows have the same value for and the same value for , and the deadlines Dm follow the same discrete uniform distribution over the range . The performance results are obtained by simulating the system using the optimal scheduling transmission probabilities, which are due to the use of symmetric flows. Although the simulations are done over multiple hyper-periods, occasional dips in curves are observed that are due to the finite time duration of simulations.
5.1. Effects of the Number of Hops
In this subsection, we study the effect of the number of hops on RMissed. In Fig. 1, we set M = 2 with asymmetric flows such that and . We show the improvement of the performance due to the use of the optimal policy for the more constrained networks needing a larger number of hops between sources and destinations. Moreover, we show how the performance of both the optimal and round robin policies improve with channel quality.
Figure 1.

The ratio RMissed vs. for different values of ρ with M = 2, and
In Fig. 2, we show the ratio RMissed as a function of the number of hops per flow. We vary the values of ρ and . In this figure, the relation between RMissed and is monotonically non-decreasing over the whole range of . Generally, the slope of the curves is higher at lower values of and decreases as increases. Moreover, the performance is enhanced by having higher values of and ρ.
Figure 2.

The ratio RMissed vs. for different values of ρ and with M = 3
5.2. Effects of the Random Deadline Range
In this subsection, we study the effects of the random deadline range on performance, specifically, the effects of on RMissed. In Fig. 3, we set M = 2 with asymmetric flows such that and . We show the improvement of the performance due to the use of the optimal policy especially for the more constrained networks with having tighter deadlines. Moreover, we show the improvement of the performance for both the optimal and round robin policies with the improvement of the channel quality. The optimal policy has an advantage over the simple round robin policy in the case of asymmetric flows.
Figure 3.

The ratio RMissed vs. for different values of ρ with M = 2, and
In Fig. 4, we demonstrate the variation of RMissed against . The range over which the random deadlines is determined through the value of where the range is wider for a higher . It is observed that the value of RMissed decreases with both and ρ. As a result, the channel quality has a greater importance in the case of a tight deadline range.
Figure 4.

The ratio RMissed vs. for different values of ρ with and M = 3
5.3. Effects of the Channel Quality
In this subsection, we study the performance against transmission success probability. The optimal strategy has higher improvement compared to the round robin policy when the difference in the two flows parameters is higher as shown in Fig. 5. This improvement increases as the transmission success probability increases.
Figure 5.

The ratio RMissed vs. ρ for different values of , and with M = 1, , and
In Fig. 6, the value of RMissed is demonstrated against transmission success probability where a monotonically non-increasing relationship is observed. In the case of , the largest variation in the curve slope is found. Hence, the importance of the channel quality is more pronounced for networks with a larger number of hops on the routes of the flows, a larger number of data flows, or tighter deadlines ranges. In the case of , the curve is almost linear such that any change in the value of ρ leads to a corresponding change in the performance. On the other hand, in the case of , the performance improves significantly for small values of ρ and the improvement rate decreases for the higher values of ρ.
Figure 6.

The ratio RMissed vs. ρ for different values of , M, and
5.4. Effects of the Number of Flows
In Fig. 7, the value of RMissed is demonstrated against M for various settings of ρ. For all values of ρ, we observe a monotonically non-decreasing relation with higher slopes at lower M and the slope decreases as M increases. The use of deadline missing probability analysis in admission control can be explained using Fig. 7. If a ratio threshold is predefined, we can use the curves to determine the maximum number of admitted flows.
Figure 7.

The ratio RMissed vs. M for different values of ρ with and
In the more general case of asymmetrical flows, similar analysis can be used to check the schedulability of a set of flows or admitting a new flow to the network in addition to the existing ones while keeping RMissed below a preset value. Furthermore, in the case of asymmetrical flows, the performance metric RMissed can be computed for individual flows and different benchmarks enforced for different flows. Hence, flow admission control or optimization of transmission probabilities for various flows can be carried out to meet these requirements.
6. Conclusions
In this paper, we have analyzed the performance of randomized frame-based scheduling for industrial wireless networking. The network has multiple data flows with random packet deadlines. Each flow is assigned a transmission probability and the frame schedule is composed at the beginning of each frame. We have derived the expression for the probability of a packet to miss its random deadline. Also, we derived the expression for the ratio of the average number of packets missing their deadlines to the average number of packets generated by all the flows per frame. Then, we studied the performance of the system using the optimal transmission probabilities to minimize that ratio. We have shown that the optimal policy is robust to the changes of the number of route hops when the random deadline range is relatively large. Moreover, a good wireless channel is needed for more constrained networks, i.e., networks that have a larger number of data flows, a larger number of hops on the routes of the flows, or tighter deadlines ranges. We have also shown how to use the derived expressions for flow admission control and schedulability. Lastly, the improvement in the performance by using the optimal policy is quantified against a simple round robin benchmark policy. In future work, we plan to study more efficient algorithms and heuristic alternatives.
Footnotes
Publisher's Disclaimer: Disclaimer
Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by the National Institute of Standards and Technology, nor is it intended to imply that the entities, materials, or equipment are necessarily the best available for the purpose.
References
- [1].Nixon M, “A comparison of WirelessHART and ISA100.11a,” Technical Report MSU-CSE-06-2; Emerson Process Management: Round Rock, TX, USA, 2012. [Google Scholar]
- [2].Liang W, Zhang X, Xiao Y, Wang F, Zeng P, and Yu H, “Survey and experiments of WIA-PA specification of industrial wireless network,” Wirel. Commun. Mob. Comput 2011, 11, 1197–1212. [Google Scholar]
- [3].Pang Z, Luvisotto M and Dzung D, “Wireless High-Performance Communications: The Challenges and Opportunities of a New Target,” in IEEE Industrial Electronics Magazine, vol. 11, no. 3, pp. 20–25, September 2017. [Google Scholar]
- [4].Willig A, and Uhlemann E, “Deadline-aware scheduling of cooperative relayers in TDMA-based wireless industrial networks, ” Wireless Networks, 10.1007/s11276-013-0593-x, 2013. [DOI]
- [5].Han S, Zhu X, Chen D, Mok AK, Nixon M, “Reliable and real-time communication in industrial wireless mesh networks”, Proc. 17th IEEE RealTime Embedded Technol. Appl. Symp. (RTAS), pp. 3–12, 2011. [Google Scholar]
- [6].Li Y, Zhang H, Huang Z and Albert M, “Optimal link scheduling for delay-constrained periodic traffic over unreliable wireless links,” IEEE Conference on Computer Communications IEEE INFOCOM 2014, Toronto, ON, 2014, pp. 1465–1473. [Google Scholar]
- [7].Dao T-N, Yoon S, Kim J, “A deadline-aware scheduling and forwarding scheme in wireless sensor networks”, Sensors, vol. 16, 2016 [DOI] [PMC free article] [PubMed] [Google Scholar]
- [8].Gungor Vehbi C., and Hancke Gerhard P., “Industrial wireless sensor networks: challenges, design principles, and technical approaches,” IEEE transactions on industrial Electronics, Vol.56, No. 10, pp.4258–4265, October 2009. [Google Scholar]
- [9].Kumar S, and Chauhan S, “A survey on scheduling algorithms for wireless sensor networks.” Int. J. Comput. Appl 2011, 20, 713. [Google Scholar]
- [10].Chitnis M, Pagano P, Lipari G, and Liang Y, “A survey on bandwidth resource allocation and scheduling in wireless sensor networks,” 2009 International Conference on Network-Based Information Systems, Indianapolis, IN, 2009, pp. 121–128. [Google Scholar]
- [11].Kashef M and Moayeri N, “Real-time scheduling for wireless networks with random deadlines,” 2017 IEEE 13th International Workshop on Factory Communication Systems (WFCS), Trondheim, Norway 2017, pp. 1–9. [Google Scholar]
- [12].Kruk L, Lehoczky J, Shreve S, and Yeung S-N, ”Earliestdeadline-first service in heavy-traffic acyclic networks,” The Annals of Applied Probability, vol. 14, no. 3, pp. 1306–1352, 2004. [Google Scholar]
- [13].Mao Z, Koksal CE and Shroff NB, ”Optimal Online Scheduling With Arbitrary Hard Deadlines in Multihop Communication Networks,” in IEEE/ACM Transactions on Networking, vol. 24, no. 1, pp. 177–189, February 2016. [Google Scholar]
- [14].Zhu HF, Lehoczky JP, Hansen JP and Rajkumar Ragunathan, ”Diff-EDF: a simple mechanism for differentiated EDF service,” 11th IEEE Real Time and Embedded Technology and Applications Symposium, 2005, pp. 268–277. [Google Scholar]
- [15].Li H, Shenoy P and Ramamritham K, ”Scheduling messages with deadlines in multi-hop real-time sensor networks,” 11th IEEE Real Time and Embedded Technology and Applications Symposium, 2005, San Francisco, CA, USA, May 7–10, 2005, pp. 415–425. [Google Scholar]
- [16].Wu C, Sha M, Gunatilaka D, Saifullah A, Lu C, and Chen Y, “Analysis of EDF scheduling for wireless sensor-actuator networks,” presented at the IWQoS, Hong Kong, China, May 26–27, 2014. [Google Scholar]
- [17].Shenker S, “Fundamental design issues for the future Internet,” IEEE J. Sel. Area Comm, vol. 13, no. 7, pp. 1176–1188, September 1995. [Google Scholar]
- [18].Parrilo PA, “Semidefinite programming relaxations for semi-algebraic problems,” Math. Program, vol. 96, pp.293–320, 2003. [Google Scholar]
- [19].Prajna S, Papachristodoulou A, Parrilo PA, “SOSTOOLS: Sum of squares optimization toolbox for Matlab,” available from http://www.cds.caltech.edu/sostools, 2002–04.
- [20].Chiang M, “Nonconvex optimization of communication systems,” Advances in Mechanics and Mathematics, Special Volume on Strang’s 70th Birthday, pp. 137–196, October 2007.
- [21].Stengle G, “A Nullstellensatz and a Positivstellensatz in semialgebraic geometry,” Math. Ann, vol. 207, pp.87–97, 1974. [Google Scholar]
- [22].Henrion D, and Lasserre J, “Detecting global optimality and extracting solutions in GloptiPoly, ” Research Report, LAAS-CNRS, 2003.
- [23].Shreedhar M and Varghese G, “Efficient fair queuing using deficit round robin,” In ACM SIGCOMM 95, Cambridge, MA, USA, August 28 September 1, 1995. [Google Scholar]
