Sciweavers

1639 search results - page 214 / 328
» Degree-constrained network flows
Sort
View
122
Voted
CNSR
2008
IEEE
155views Communications» more  CNSR 2008»
15 years 7 months ago
Detecting Network Anomalies Using Different Wavelet Basis Functions
Signal processing techniques have been applied recently for analyzing and detecting network anomalies due to their potential to find novel or unknown intrusions. In this paper, we...
Wei Lu, Mahbod Tavallaee, Ali A. Ghorbani
ICC
2008
IEEE
118views Communications» more  ICC 2008»
15 years 7 months ago
Bounded-Variance Network Calculus: Computation of Tight Approximations of End-to-End Delay
Abstract ⎯ Currently, the most advanced framework for stochastic network calculus is the min-plus algebra, providing bounds for the end-to-end delay in networks. The bounds calcu...
Paolo Giacomazzi, Gabriella Saddemi
121
Voted
ICC
2007
IEEE
174views Communications» more  ICC 2007»
15 years 7 months ago
Fairness Improvement and Efficient Rerouting in Mobile Ad Hoc Networks
— Mobile ad hoc networking allows nodes to form temporary networks and communicate with each other possibly via multiple hops. By using a special node called the gateway, an ad h...
Norihiro Ohata, Yongbing Zhang, Yusheng Ji, Xuemin...
107
Voted
AINA
2006
IEEE
15 years 6 months ago
An Alternative Approach to Multi-Path Forwarding on IPv6 Networks
Abstract—This paper proposes a novel technique to enable flow-level multi-path forwarding on IPv6 networks. Generally on such networks, any packet from a node is forwarded towar...
Hideaki Imaizumi, Hiroyuki Morikawa, Osamu Nakamur...
85
Voted
GLOBECOM
2006
IEEE
15 years 6 months ago
On the Throughput-Cost Tradeoff of Multi-Tiered Optical Network Architectures
— In this work, we conduct a throughput-cost study of several optical network architectures: Optical Flow Switching (OFS), Tell-and-Go (TaG), Electronic Packet Switching (EPS), a...
Guy Weichenberg, Vincent W. S. Chan, Muriel M&eacu...