Sciweavers

1639 search results - page 108 / 328
» Degree-constrained network flows
Sort
View
84
Voted
TON
2002
82views more  TON 2002»
15 years 13 days ago
On multicast flow control for heterogeneous receivers
In this paper, we study the impact of heterogeneous receivers on the throughput of multicast flow control and propose a new multicast flow control algorithm to optimally partition ...
Rung-Hung Gau, Zygmunt J. Haas, Bhaskar Krishnamac...
123
Voted
IPOM
2009
Springer
15 years 7 months ago
A Labeled Data Set for Flow-Based Intrusion Detection
Abstract. Flow-based intrusion detection has recently become a promising security mechanism in high speed networks (1-10 Gbps). Despite the richness in contributions in this field...
Anna Sperotto, Ramin Sadre, Frank van Vliet, Aiko ...
112
Voted
COCOON
2007
Springer
15 years 7 months ago
Algorithms for Core Stability, Core Largeness, Exactness, and Extendability of Flow Games
In this paper, we give linear time algorithms to decide core stability, core largeness, exactness, and extendability of flow games on uniform networks (all edge capacities are 1)....
Qizhi Fang, Rudolf Fleischer, Jian Li, Xiaoxun Sun
ICPP
1998
IEEE
15 years 5 months ago
Efficient Multicast on Myrinet using Link-Level Flow Control
This paper studies the implementation of efficient multicast protocols for Myrinet, a switched, wormhole-routed, Gigabit-per-second network technology. Since Myrinet does not supp...
Raoul Bhoedjang, Tim Rühl, Henri E. Bal
85
Voted
NOSSDAV
2009
Springer
15 years 7 months ago
Rapid identification of Skype traffic flows
In this paper we present results of experimental work using machine learning techniques to rapidly identify Skype traffic. We show that Skype traffic can be identified by observin...
Philip Branch, Amiel Heyde, Grenville J. Armitage