Sciweavers

1639 search results - page 84 / 328
» Degree-constrained network flows
Sort
View
ICASSP
2009
IEEE
15 years 4 months ago
Multi-flow attack resistant watermarks for network flows
In this work we present a Multi-flow Attack Resistant Interval Centroid Based Watermarking (MAR-ICBW) scheme for network flows. Our proposed scheme can withstand the newly intro...
Amir Houmansadr, Negar Kiyavash, Nikita Borisov
MFCS
2009
Springer
15 years 4 months ago
The Cost of Stability in Network Flow Games
The core of a cooperative game contains all stable distributions of a coalition’s gains among its members. However, some games have an empty core, with every distribution being ...
Ezra Resnick, Yoram Bachrach, Reshef Meir, Jeffrey...
INFOCOM
2008
IEEE
15 years 4 months ago
Maximizing Resilient Throughput in Peer-to-Peer Network: A Generalized Flow Approach
—A unique challenge in P2P network is that the peer dynamics (departure or failure) cause unavoidable disruption to the downstream peers. While many works have been dedicated to ...
Bin Chang, Yi Cui, Yuan Xue
FGCN
2007
IEEE
109views Communications» more  FGCN 2007»
15 years 4 months ago
Flow Balancing Hardware for Parallel TCP Streams on Long Fat Pipe Network
Parallel TCP streams are used for data transfer between clusters in today's high performance applications. When parallel TCP streams are used on LFN, part of streams fail to ...
Yutaka Sugawara, Mary Inaba, Kei Hiraki
89
Voted
ISCC
2003
IEEE
113views Communications» more  ISCC 2003»
15 years 3 months ago
Channel Sharing of Competing Flows in Ad Hoc Networks
This paper studies the fairness with which competing flows share the channel in ad hoc networks using collision avoidance protocols. It is shown that the required multihop coordi...
Yu Wang, J. J. Garcia-Luna-Aceves