Sciweavers

1639 search results - page 118 / 328
» Degree-constrained network flows
Sort
View
94
Voted
OSDI
2006
ACM
16 years 1 months ago
Making Information Flow Explicit in HiStar
HiStar is a new operating system designed to minimize the amount of code that must be trusted. HiStar provides strict information flow control, which allows users to specify preci...
David Mazières, Eddie Kohler, Nickolai Zeld...
109
Voted
JNW
2007
88views more  JNW 2007»
15 years 21 days ago
Integrated Proactive Admission Control Technique For both UDP And TCP Traffic Flows
—Real time traffic adopting UDP at the transport layer needs some quality of service. It is offered through an admission control scheme. This paper adopts one such scheme which i...
Lakshmanan Senthilkumar, Venkadachalam Sankaranara...
WCNC
2008
IEEE
15 years 7 months ago
Network Coding via Opportunistic Forwarding in Wireless Mesh Networks
— Network coding has been used to increase transportation capabilities in wireless mesh networks. In mesh networks, the coding opportunities depend on the co-location of multiple...
Jian Zhang, Yuanzhu Peter Chen, Ivan Marsic
122
Voted
INFOCOM
2009
IEEE
15 years 7 months ago
On Passive One-Way Loss Measurements Using Sampled Flow Statistics
—The ability to scalably measure one-way packet loss across different network paths is vital to IP network management. However, the effectiveness of active-measurement techniques...
Yu Gu, Lee Breslau, Nick G. Duffield, Subhabrata S...
121
Voted
NETCOOP
2009
Springer
15 years 7 months ago
User Association to Optimize Flow Level Performance in Wireless Systems with Dynamic Interference
We study the impact of user association policies on flow-level performance in interference limited wireless networks. Most research in this area has used static interference model...
Balaji Rengarajan, Gustavo de Veciana