Sciweavers

1639 search results - page 197 / 328
» Degree-constrained network flows
Sort
View
90
Voted
AINA
2006
IEEE
15 years 4 months ago
BPB: A method for transparently obtaining network path characteristics close to the sender
Due to the growth of unresponsive UDP traffic in the Internet, it becomes increasingly important for ISPs to amply shape the traffic that leaves their network. Ideally, flows shou...
Sven Hessler, Jean-Alexander Müller, Michael ...
WCET
2008
15 years 2 months ago
INFER: Interactive Timing Profiles based on Bayesian Networks
We propose an approach for timing analysis of software-based embedded computer systems that builds on the established probabilistic framework of Bayesian networks. We envision an ...
Michael Zolda
WSC
2001
15 years 2 months ago
Deterministic fluid models of congestion control in high-speed networks
Congestion control algorithms, such as TCP or the closelyrelated additive increase-multiplicative decrease algorithms, are extremely difficult to simulate on a large scale. The re...
Sanjay Shakkottai, R. Srikant
98
Voted
CORR
2008
Springer
169views Education» more  CORR 2008»
15 years 27 days ago
Congestion Reduction Using Ad hoc Message Dissemination in Vehicular Networks
Abstract-- Vehicle-to-vehicle communications can be used effectively for intelligent transport systems (ITS) and locationaware services [1]. The ability to disseminate information ...
Thomas D. Hewer, Maziar Nekovee
83
Voted
IJNSEC
2006
80views more  IJNSEC 2006»
15 years 24 days ago
Authenticated Access to Reserved Network Resources
Enhanced network services often involve preferential allocation of resources such as transmission capacity ("bandwidth") and buffer space to packets belonging to certain...
Kenneth L. Calvert, Srinivasan Venkatraman, Jim Gr...