Sciweavers

1639 search results - page 86 / 328
» Degree-constrained network flows
Sort
View
DATE
2007
IEEE
106views Hardware» more  DATE 2007»
15 years 4 months ago
Design closure driven delay relaxation based on convex cost network flow
Design closure becomes hard to achieve at physical layout stage due to the emergence of long global interconnects. Consequently, interconnect planning needs to be integrated in hi...
Chuan Lin, Aiguo Xie, Hai Zhou
IM
2007
14 years 11 months ago
Real-time Analysis of Flow Data for Network Attack Detection
— With the wide deployment of flow monitoring in IP networks, the analysis of the exported flow data has become an important research area. It has been shown that flow data ca...
Gerhard Münz, Georg Carle
CORR
2010
Springer
118views Education» more  CORR 2010»
14 years 10 months ago
Asymptotic Traffic Flow in an Hyperbolic Network II: Non-uniform Traffic
In this work we study the asymptotic traffic behaviour in Gromov's hyperbolic spaces when the traffic decays exponentially with the distance. We prove that under general condi...
Yuliy Baryshnikov, Gabriel H. Tucci
79
Voted
INFORMS
2010
125views more  INFORMS 2010»
14 years 8 months ago
Combining Exact and Heuristic Approaches for the Capacitated Fixed-Charge Network Flow Problem
We develop a solution approach for the fixed charge network flow problem (FCNF) that produces provably high-quality solutions quickly. The solution approach combines mathematica...
Mike Hewitt, George L. Nemhauser, Martin W. P. Sav...
91
Voted
SP
2007
IEEE
157views Security Privacy» more  SP 2007»
15 years 4 months ago
Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems
Many proposed low-latency anonymous communication systems have used various flow transformations such as traffic padding, adding cover traffic (or bogus packets), packet droppi...
Xinyuan Wang, Shiping Chen, Sushil Jajodia