Sciweavers

1639 search results - page 193 / 328
» Degree-constrained network flows
Sort
View
110
Voted
IMC
2010
ACM
14 years 10 months ago
Temporally oblivious anomaly detection on large networks using functional peers
Previous methods of network anomaly detection have focused on defining a temporal model of what is "normal," and flagging the "abnormal" activity that does not...
Kevin M. Carter, Richard Lippmann, Stephen W. Boye...
112
Voted
LISA
2008
15 years 3 months ago
Topnet: A Network-aware top(1)
System administrators regularly use the top utility for understanding the resource consumption of the processes running on UNIX computers. Top provides an accurate and real-time d...
Antonis Theocharides, Demetres Antoniades, Michali...
96
Voted
CORR
2008
Springer
115views Education» more  CORR 2008»
15 years 28 days ago
Multi-hop Cooperative Wireless Networks: Diversity Multiplexing Tradeoff and Optimal Code Design
In this paper, we consider single-source, single-sink (ss-ss) multi-hop relay networks, with slow-fading Rayleigh links and single-antenna relay nodes operating under the half-dupl...
K. Sreeram, S. Birenjith, P. Vijay Kumar
102
Voted
ANCS
2010
ACM
14 years 11 months ago
Ensemble routing for datacenter networks
: Ensemble Routing For Datacenter Networks Mike Schlansker, Yoshio Turner, Jean Tourrilhes, Alan Karp HP Laboratories HPL-2010-120 Networks, Ethernet, Multipath, Switching, Fault ...
Mike Schlansker, Yoshio Turner, Jean Tourrilhes, A...
RAID
1999
Springer
15 years 5 months ago
Towards trapping wily intruders in the large
The rapid increase in network bandwidth from mega bits per second to giga bits per second and potentially to tera bits per second, is making it increasingly difficult to carry out...
Glenn Mansfield