

Author: Khudyakov Polyna Feigin Paul Mandelbaum Avishai
Publisher: Springer Publishing Company
ISSN: 0257-0130
Source: Queueing Systems, Vol.66, Iss.3, 2010-11, pp. : 215-237
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content








Designing attacks on SIP call set-up
International Journal of Applied Cryptography, Vol. 2, Iss. 1, 2010-07 ,pp. :


Call Center Staffing with Simulation and Cutting Plane Methods
Annals of Operations Research, Vol. 127, Iss. 1-4, 2004-03 ,pp. :