Sciweavers

1639 search results - page 103 / 328
» Degree-constrained network flows
Sort
View
ACSAC
2007
IEEE
15 years 4 months ago
Efficient Detection of Delay-Constrained Relay Nodes
Relay nodes are a potential threat to networks since they are used in many malicious situations like stepping stone attacks, botnet communication, peer-to-peer streaming etc. Quic...
Baris Coskun, Nasir D. Memon
67
Voted
QUESTA
2006
98views more  QUESTA 2006»
15 years 21 days ago
Fluid models of integrated traffic and multipath routing
In this paper we consider a stochastic model describing the varying number of flows in a network. This model features flows of two types, namely file transfers (with fixed volume)...
Peter B. Key, Laurent Massoulié
INFOCOM
2000
IEEE
15 years 4 months ago
Traffic Engineering Using Multiple Multipoint-to-Point LSPs
Traffic engineering aims to optimize the utilization of existing network resources for load balance and failure recovery, and these are to be accomplished in a scalable fashion. Th...
Hiroyuki Saito, Yasuhiro Miyao, Makiko Yoshida
CCR
2006
82views more  CCR 2006»
15 years 25 days ago
Why flow-completion time is the right metric for congestion control
Users typically want their flows to complete as quickly as possible: They want a web-page to download quickly, or a file transfer to complete as rapidly as possible. In other words...
Nandita Dukkipati, Nick McKeown
CCR
2006
92views more  CCR 2006»
15 years 25 days ago
Flow labelled IP over ATM: design and rationale
We describe a system in which layer 2 switching is placed directly under the control of layer 3 routing protocols on a hop-by-hop basis. Specifically, ATM switching is controlled ...
Greg Minshall, Robert M. Hinden, Eric Hoffman, Fon...