Sciweavers

280 search results - page 18 / 56
» Bandwidth-sharing in overloaded networks
Sort
View
DMIN
2006
113views Data Mining» more  DMIN 2006»
14 years 11 months ago
Performance Evaluation of Two Data Mining Techniques of Network Alarms Analysis
In large telecommunication networks, alarms are usually useful for identifying faults and, therefore solving them. However, for large systems the number of alarms produced is so la...
Jacques-H. Bellec, M. Tahar Kechadi, Joe Carthy
ICIW
2007
IEEE
15 years 4 months ago
New Topology Management Algorithms for Unstructured P2P Networks
In this paper we present new topology management algorithms used to self-organize the overlay of a peer-topeer network. The algorithms are Node Selection, Node Removal, Overload E...
Annemari Auvinen, Mikko Vapa, Matthieu Weber, Niko...
HICSS
2007
IEEE
95views Biometrics» more  HICSS 2007»
15 years 4 months ago
Protecting with Sensor Networks: Attention and Response
Sensor networks are expected to play an important role in hybrid protection infrastructures when combined with robots and human decision makers. In order to be effective, detectio...
Jeffrey V. Nickerson, Stephan Olariu
IPCO
2001
79views Optimization» more  IPCO 2001»
14 years 11 months ago
Synthesis of 2-Commodity Flow Networks
We investigate network design under volatile conditions of link failures and traffic overload. Our model is a non-simultaneous 2-commodity problem. We characterize the feasible so...
Refael Hassin, Asaf Levin
KDD
2009
ACM
180views Data Mining» more  KDD 2009»
15 years 10 months ago
Mining social networks for personalized email prioritization
Email is one of the most prevalent communication tools today, and solving the email overload problem is pressingly urgent. A good way to alleviate email overload is to automatical...
Shinjae Yoo, Yiming Yang, Frank Lin, Il-Chul Moon