Sciweavers

1639 search results - page 58 / 328
» Degree-constrained network flows
Sort
View
NETWORKS
2008
14 years 10 months ago
Price competition with elastic traffic
In this paper, we present a combined study of price competition and traffic control in a congested network. We study a model in which service providers own the routes in a network...
Asuman E. Ozdaglar
BROADNETS
2007
IEEE
15 years 4 months ago
Reduced flow routing: Leveraging residual capacity to reduce blocking in GMPLS networks
— Traffic engineering has been extensively studied to maximize network resource utilization while minimizing call blocking [1]. As the the demand for high data rate services ove...
Xiaolan J. Zhang, Sun-il Kim, Steven S. Lumetta
ICCSA
2007
Springer
15 years 4 months ago
Quasi-hierarchical Evolutionary Algorithm for Flow Optimization in Survivable MPLS Networks
In this paper we address the problem of working paths optimization in survivable MPLS network. We focus on an existing facility network, in which only network flows can be optimize...
Michal Przewozniczek, Krzysztof Walkowiak
PADS
1996
ACM
15 years 2 months ago
Queueing Models and Stability of Message Flows in Distributed Simulators of Open Queueing Networks
In this paper we study message flow processes in distributed simulators of open queueing networks. We develop and study queueing models for distributed simulators with maximum loo...
Manish Gupta 0007, Anurag Kumar, Rajeev Shorey
CORR
2010
Springer
176views Education» more  CORR 2010»
14 years 10 months ago
Network Traffic Anomalies Detection and Identification with Flow Monitoring
Network management and security is currently one of the most vibrant research areas, among which, research on detecting and identifying anomalies has attracted a lot of interest. R...
Huy Anh Nguyen, Tam Van Nguyen, Dong Il Kim, Deokj...