default search action
Ilkka Norros
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j26]Ilkka Norros:
Information-based long-range dependence. Queueing Syst. Theory Appl. 100(3-4): 321-323 (2022)
2010 – 2019
- 2019
- [j25]Hannu Reittu, Ilkka Norros, Tomi Räty, Marianna Bolla, Fülöp Bazsó:
Regular Decomposition of Large Graphs: Foundation of a Sampling Approach to Stochastic Block Model Fitting. Data Sci. Eng. 4(1): 44-60 (2019) - 2017
- [j24]François Baccelli, Fabien Mathieu, Ilkka Norros:
Mutual service processes in Euclidean spaces: existence and ergodicity. Queueing Syst. Theory Appl. 86(1-2): 95-140 (2017) - [c19]Hannu Reittu, Ilkka Norros:
Regular decomposition of large graphs and other structures: Scalability and robustness towards missing data. IEEE BigData 2017: 3352-3357 - [i7]Hannu Reittu, Fülöp Bazsó, Ilkka Norros:
Regular Decomposition: an information and graph theoretic approach to stochastic block models. CoRR abs/1704.07114 (2017) - [i6]Hannu Reittu, Ilkka Norros, Fülöp Bazsó:
Regular decomposition of large graphs and other structures: scalability and robustness towards missing data. CoRR abs/1711.08629 (2017) - 2016
- [j23]Andrea Bianco, Robert Bestak, Ilkka Norros:
Special session on selected papers from Networking 2015. Comput. Commun. 84: 39 (2016) - 2015
- [j22]Barlas Oguz, Venkat Anantharam, Ilkka Norros:
Stable Distributed P2P Protocols Based on Random Peer Sampling. IEEE/ACM Trans. Netw. 23(5): 1444-1456 (2015) - [c18]Giancarlo Pastor, Ilkka Norros, Riku Jäntti, Antonio J. Caamaño:
Compressive Data Aggregation from Poisson point process observations. ISWCS 2015: 106-110 - 2014
- [j21]Ilkka Norros, Pirkko Kuusela, Jérôme Lapuyade-Lahorgue, Maurizio Naldi, Mika Sirvio:
Repairable Systems With Dependent Components: Stochastic Process Techniques and Models. IEEE Trans. Reliab. 63(4): 899-912 (2014) - 2013
- [j20]Leena Norros, Ilkka Norros, Marja Liinasuo, Kari Seppänen:
Impact of human operators on communication network dependability. Cogn. Technol. Work. 15(4): 363-372 (2013) - [j19]Piotr Cholda, Eirik Larsen Følstad, Bjarne E. Helvik, Pirkko Kuusela, Maurizio Naldi, Ilkka Norros:
Towards risk-aware communications networking. Reliab. Eng. Syst. Saf. 109: 160-174 (2013) - [c17]Pirkko Kuusela, Ilkka Norros:
Dynamic approach to service level agreement risk. DRCN 2013: 266-273 - [c16]François Baccelli, Fabien Mathieu, Ilkka Norros, Rémi Varloot:
Can P2P networks be super-scalable? INFOCOM 2013: 1753-1761 - [i5]François Baccelli, Fabien Mathieu, Ilkka Norros, Rémi Varloot:
Can P2P Networks be Super-Scalable? CoRR abs/1304.6489 (2013) - 2012
- [c15]Barlas Oguz, Venkat Anantharam, Ilkka Norros:
Stable, distributed P2P protocols based on random peer sampling. Allerton Conference 2012: 915-919 - 2011
- [j18]Ilkka Norros, Hannu Reittu, Timo Eirola:
On the stability of two-chunk file-sharing systems. Queueing Syst. Theory Appl. 67(3): 183-206 (2011) - [j17]Ilkka Norros, Hannu Flinck:
Powering Internet with power-law networking. Telecommun. Syst. 48(1-2): 63-75 (2011) - [c14]Leena Norros, Ilkka Norros, Marja Liinasuo, Kari Seppänen:
Impact of human operators on communication network dependability. ECCE 2011: 35-42 - [i4]Barlas Oguz, Venkat Anantharam, Ilkka Norros:
Stable, scalable, decentralized P2P file sharing with non-altruistic peers. CoRR abs/1107.3166 (2011) - [i3]François Baccelli, Fabien Mathieu, Ilkka Norros:
Performance of P2P Networks with Spatial Interactions of Peers. CoRR abs/1108.4129 (2011) - 2010
- [c13]Pirkko Kuusela, Ilkka Norros:
On/off process modeling of IP network failures. DSN 2010: 585-594
2000 – 2009
- 2009
- [c12]Ilkka Norros:
Powernet: Compact Routing on Internet-like Random Networks. NGI 2009: 1-8 - [c11]Ilkka Norros:
A mean-field approach to some Internet-like random networks. ITC 2009: 1-8 - [c10]Hannu Reittu, Ilkka Norros:
A power-law graph as a distributed hash table with quick search and small tables. VALUETOOLS 2009: 28 - [i2]Ilkka Norros, Hannu Reittu, Timo Eirola:
On the stability of two-chunk file-sharing systems. CoRR abs/0910.5577 (2009) - 2008
- [j16]Ilkka Norros, Hannu Reittu:
Attack Resistance of Power-Law Random Graphs in the Finite-Mean, Infinite-Variance Region. Internet Math. 5(3): 251-266 (2008) - [j15]Ilkka Norros, Hannu Reittu:
Network models with a 'soft hierarchy': a random graph construction with loglog scalability. IEEE Netw. 22(2): 40-46 (2008) - [c9]Ilkka Norros, Pirkko Kuusela, Pekka Savola:
A Dependability Case Approach to the Assessment of IP Networks. SECURWARE 2008: 426-432 - [c8]Ilkka Norros, Hannu Reittu:
Urn models and peer-to-peer file sharing. WiOpt 2008: 554 - 2007
- [j14]Michel Mandjes, Petteri Mannersalo, Ilkka Norros:
Gaussian tandem queues with an application to dimensioning of switch fabric interfaces. Comput. Networks 51(3): 781-797 (2007) - [c7]Ilkka Norros, Balakrishna J. Prabhu, Hannu Reittu:
On Uncoordinated File Distribution with Non-altruistic Downloaders. ITC 2007: 606-617 - [c6]Hannu Reittu, Ilkka Norros:
Toward modeling of a single file broadcasting in a closed network. WiOpt 2007: 1-5 - [i1]Ilkka Norros, Eero Saksman:
Local independence of fractional Brownian motion. CoRR abs/0711.4809 (2007) - 2004
- [j13]Hannu Reittu, Ilkka Norros:
On the power-law random graph model of massive data networks. Perform. Evaluation 55(1-2): 3-23 (2004) - [j12]Petteri Mannersalo, Ilkka Norros, Paavo Salminen:
A Storage Process with Local Time Input. Queueing Syst. Theory Appl. 46(3-4): 557-577 (2004) - 2003
- [j11]Alfred O. Hero III, Ilkka Norros, Athina P. Petropulu, Rudolf H. Riedi:
Guest editorial special issue on signal processing in networking. IEEE Trans. Signal Process. 51(8): 2017-2018 (2003) - 2002
- [j10]Petteri Mannersalo, Ilkka Norros:
A most probable path approach to queueing systems with general Gaussian input. Comput. Networks 40(3): 399-412 (2002) - [j9]Ron Addie, Petteri Mannersalo, Ilkka Norros:
Most probable paths and performance formulae for buffers with gaussian input traffic. Eur. Trans. Telecommun. 13(3): 183-196 (2002) - [c5]Hannu Reittu, Ilkka Norros:
On the effect of very large nodes in Internet graphs. GLOBECOM 2002: 2624-2628 - [c4]Jorma Kilpi, Ilkka Norros:
Testing the Gaussian approximation of aggregate traffic. Internet Measurement Workshop 2002: 49-61 - [c3]Petteri Mannersalo, Ilkka Norros:
GPS schedulers and Gaussian traffic. INFOCOM 2002: 1660-1667 - [c2]Ilkka Norros:
Most Probable Path Techniques for Gaussian Queueing Systems. NETWORKING 2002: 86-104 - 2001
- [j8]Paavo Salminen, Ilkka Norros:
On Busy Periods of the Unbounded Brownian Storage. Queueing Syst. Theory Appl. 39(4): 317-333 (2001)
1990 – 1999
- 1996
- [j7]Samuli Aalto, Ilkka Norros, Jorma T. Virtamo, J. L. Berg, E. Smeitink:
Architectural issues of ATM based connectionless overlay network. Telecommun. Syst. 5(1): 159-175 (1996) - 1995
- [j6]Ilkka Norros:
On the Use of Fractional Brownian Motion in the Theory of Connectionless Networks. IEEE J. Sel. Areas Commun. 13(6): 953-962 (1995) - 1994
- [j5]Jorma T. Virtamo, Ilkka Norros:
Fluid queue driven by anM/M/1 queue. Queueing Syst. Theory Appl. 16(3-4): 373-386 (1994) - [j4]Ilkka Norros:
A storage model with self-similar input. Queueing Syst. Theory Appl. 16(3-4): 387-396 (1994) - 1993
- [c1]Jorma T. Virtamo, Ilkka Norros:
On the Broadening of Cell Bursts in an ATM Network. Integrated Broadband Communications 1993: 373-381 - 1991
- [j3]Ilkka Norros, James W. Roberts, Alain Simonian, Jorma T. Virtamo:
The Superposition of Variable Bit Rate Sources in an ATM Multiplexer. IEEE J. Sel. Areas Commun. 9(3): 378-387 (1991)
1980 – 1989
- 1989
- [j2]Elja Arjas, Ilkka Norros:
Change of Life Distribution Via a Hazard Transformation: An Inequality with Application to Minimal Repair. Math. Oper. Res. 14(2): 355-361 (1989) - 1984
- [j1]Elja Arjas, Ilkka Norros:
Life Lengths and Association: A Dynamic Approach. Math. Oper. Res. 9(1): 151-158 (1984)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint