Sciweavers

248 search results - page 29 / 50
» Characterizing a spam traffic
Sort
View
STOC
2002
ACM
156views Algorithms» more  STOC 2002»
15 years 9 months ago
Selfish traffic allocation for server farms
We investigate the price of selfish routing in non-cooperative networks in terms of the coordination and bicriteria ratios in the recently introduced game theoretic network model ...
Artur Czumaj, Piotr Krysta, Berthold Vöcking
ICIP
2008
IEEE
15 years 11 months ago
A scalable complexity specification for video applications
We propose a new complexity modeling framework for multimedia tasks. We characterize the traffic with five parameters that together we designate as a task's complexity specif...
Nicholas Mastronarde, Mihaela van der Schaar
IPCO
2001
79views Optimization» more  IPCO 2001»
14 years 11 months ago
Synthesis of 2-Commodity Flow Networks
We investigate network design under volatile conditions of link failures and traffic overload. Our model is a non-simultaneous 2-commodity problem. We characterize the feasible so...
Refael Hassin, Asaf Levin
VLDB
2005
ACM
177views Database» more  VLDB 2005»
15 years 3 months ago
Discovering Large Dense Subgraphs in Massive Graphs
We present a new algorithm for finding large, dense subgraphs in massive graphs. Our algorithm is based on a recursive application of fingerprinting via shingles, and is extreme...
David Gibson, Ravi Kumar, Andrew Tomkins
SIGCOMM
1995
ACM
15 years 1 months ago
Performance Bounds in Communication Networks with Variable-Rate Links
In most network models for quality of service support, the communication links interconnecting the switches and gateways are assumed to have fixed bandwidth and zero error rate. T...
Kam Lee