Sciweavers

1639 search results - page 61 / 328
» Degree-constrained network flows
Sort
View
MOBIHOC
2003
ACM
15 years 3 months ago
Improving fairness among TCP flows crossing wireless ad hoc and wired networks
In scenarios where wireless ad hoc networks are deployed, sometimes it would be desirable that ad hoc nodes can communicate with servers in wired networks to upload or download da...
Luqing Yang, Winston Khoon Guan Seah, Qinghe Yin
CSC
2006
14 years 11 months ago
An Adaptive Method for Flow Simulation in Three-Dimensional Heterogeneous Discrete Fracture Networks
Natural fractured media are highly unpredictable because of existing complex structures at the fracture and at the network levels. Fractures are by themselves heterogeneous objects...
Hussein Mustapha
ISM
2008
IEEE
104views Multimedia» more  ISM 2008»
15 years 4 months ago
Provision of Quality of Service with Router Support
The current Internet servers are susceptible to network attacks. The DDoS attacks consume the network bandwidth and degrade the services provided by the servers. This paper propos...
Hongli Luo, Mei-Ling Shyu
ITNG
2008
IEEE
15 years 4 months ago
On the Properties of System-Wide Responsive Behavior
High contention of flows is associated with unstable network behavior and unmanageable resource administration, i.e., convergence to equilibrium becomes a difficult task. In this ...
Ageliki Tsioliaridou, Vassilis Tsaoussidis
CEAS
2008
Springer
15 years 10 hour ago
Exploiting Transport-Level Characteristics of Spam
We present a novel spam detection technique that relies on neither content nor reputation analysis. This work investigates the discriminatory power of email transport-layer charac...
Robert Beverly, Karen R. Sollins