{"id":"https://openalex.org/W2027119645","doi":"https://doi.org/10.1109/itw.2012.6404690","title":"Stability and capacity through evacuation times","display_name":"Stability and capacity through evacuation times","publication_year":2012,"publication_date":"2012-09-01","ids":{"openalex":"https://openalex.org/W2027119645","doi":"https://doi.org/10.1109/itw.2012.6404690","mag":"2027119645"},"language":"en","primary_location":{"id":"doi:10.1109/itw.2012.6404690","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itw.2012.6404690","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE Information Theory Workshop","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001052113","display_name":"Leonidas Georgiadis","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Leonidas Georgiadis","raw_affiliation_strings":["AUTH","AUTH, Greece"],"affiliations":[{"raw_affiliation_string":"AUTH","institution_ids":[]},{"raw_affiliation_string":"AUTH, Greece","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070393786","display_name":"Georgios S. Paschos","orcid":"https://orcid.org/0000-0002-5922-1612"},"institutions":[{"id":"https://openalex.org/I4210093649","display_name":"Information Technologies Institute","ror":"https://ror.org/0069akp70","country_code":"GR","type":"nonprofit","lineage":["https://openalex.org/I4210093649"]},{"id":"https://openalex.org/I4210134249","display_name":"Centre for Research and Technology Hellas","ror":"https://ror.org/03bndpq63","country_code":"GR","type":"facility","lineage":["https://openalex.org/I4210134249"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Georgios S. Paschos","raw_affiliation_strings":["ITI-CERTH","ITI-CERTH, Greece"],"affiliations":[{"raw_affiliation_string":"ITI-CERTH","institution_ids":["https://openalex.org/I4210093649","https://openalex.org/I4210134249"]},{"raw_affiliation_string":"ITI-CERTH, Greece","institution_ids":["https://openalex.org/I4210093649","https://openalex.org/I4210134249"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014892027","display_name":"Leandros Tassiulas","orcid":"https://orcid.org/0000-0003-0932-774X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Leandros Tassiulas","raw_affiliation_strings":["UTH, Greece"],"affiliations":[{"raw_affiliation_string":"UTH, Greece","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110572338","display_name":"Lavy Libman","orcid":null},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Lavy Libman","raw_affiliation_strings":["University of NSW, Australia"],"affiliations":[{"raw_affiliation_string":"University of NSW, Australia","institution_ids":["https://openalex.org/I31746571"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5001052113"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.4979,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.83811248,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"347","last_page":"351"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11409","display_name":"Advanced Wireless Network Optimization","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11409","display_name":"Advanced Wireless Network Optimization","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10974","display_name":"Advanced Queuing Theory Analysis","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/erasure","display_name":"Erasure","score":0.8525842428207397},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6955517530441284},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.6727710366249084},{"id":"https://openalex.org/keywords/stability","display_name":"Stability (learning theory)","score":0.6683706045150757},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.638515055179596},{"id":"https://openalex.org/keywords/connection","display_name":"Connection (principal bundle)","score":0.6160451769828796},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.5967755913734436},{"id":"https://openalex.org/keywords/channel-capacity","display_name":"Channel capacity","score":0.5361964702606201},{"id":"https://openalex.org/keywords/binary-erasure-channel","display_name":"Binary erasure channel","score":0.47229793667793274},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4079328179359436},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3936888873577118},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.32121315598487854},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.21024435758590698},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.09857514500617981},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.06359890103340149}],"concepts":[{"id":"https://openalex.org/C2778790127","wikidata":"https://www.wikidata.org/wiki/Q484885","display_name":"Erasure","level":2,"score":0.8525842428207397},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6955517530441284},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.6727710366249084},{"id":"https://openalex.org/C112972136","wikidata":"https://www.wikidata.org/wiki/Q7595718","display_name":"Stability (learning theory)","level":2,"score":0.6683706045150757},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.638515055179596},{"id":"https://openalex.org/C13355873","wikidata":"https://www.wikidata.org/wiki/Q2920850","display_name":"Connection (principal bundle)","level":2,"score":0.6160451769828796},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.5967755913734436},{"id":"https://openalex.org/C97744766","wikidata":"https://www.wikidata.org/wiki/Q870845","display_name":"Channel capacity","level":3,"score":0.5361964702606201},{"id":"https://openalex.org/C149862233","wikidata":"https://www.wikidata.org/wiki/Q864142","display_name":"Binary erasure channel","level":4,"score":0.47229793667793274},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4079328179359436},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3936888873577118},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32121315598487854},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.21024435758590698},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.09857514500617981},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.06359890103340149},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/itw.2012.6404690","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itw.2012.6404690","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE Information Theory Workshop","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/8","score":0.699999988079071,"display_name":"Decent work and economic growth"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W565357261","https://openalex.org/W2037612923","https://openalex.org/W2099111195","https://openalex.org/W2122756979","https://openalex.org/W2953321387"],"related_works":["https://openalex.org/W2372190485","https://openalex.org/W2139769859","https://openalex.org/W2583282232","https://openalex.org/W2140357074","https://openalex.org/W2002203372","https://openalex.org/W2113562070","https://openalex.org/W2810502498","https://openalex.org/W2743670993","https://openalex.org/W2028268383","https://openalex.org/W4280593613"],"abstract_inverted_index":{"We":[0,19],"consider":[1],"a":[2,16],"system":[3,34,55],"where":[4],"jobs":[5],"(packets)":[6],"arrive":[7],"for":[8,58],"processing":[9],"using":[10],"one":[11],"of":[12,32,39,49],"the":[13,21,24,29,33,36,47,59],"policies":[14],"in":[15],"given":[17,37],"class.":[18],"study":[20],"connection":[22],"between":[23],"minimal":[25],"evacuation":[26],"times":[27],"and":[28,54],"stability":[30,56],"region":[31,53,57],"under":[35],"class":[38],"policies.":[40],"The":[41],"result":[42],"is":[43],"used":[44],"to":[45],"establish":[46],"equality":[48],"information":[50],"theoretic":[51],"capacity":[52],"multiuser":[60],"broadcast":[61],"erasure":[62],"channel":[63],"with":[64],"feedback.":[65]},"counts_by_year":[{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":3}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
