Sciweavers

1639 search results - page 99 / 328
» Degree-constrained network flows
Sort
View
88
Voted
CP
2008
Springer
15 years 1 days ago
Flow-Based Propagators for the SEQUENCE and Related Global Constraints
We propose new filtering algorithms for the SEQUENCE constraint and some extensions of the SEQUENCE constraint based on network flows. We enforce domain consistency on the SEQUENCE...
Michael J. Maher, Nina Narodytska, Claude-Guy Quim...
92
Voted
JAL
2006
89views more  JAL 2006»
14 years 10 months ago
Improved bounds for the unsplittable flow problem
In this paper we consider the unsplittable flow problem (UFP): given a directed or undirected network G = (V, E) with edge capacities and a set of terminal pairs (or requests) wit...
Petr Kolman, Christian Scheideler
JDCTA
2010
172views more  JDCTA 2010»
14 years 5 months ago
Characterizing MEGACO Security in the presence Diameter Server
This paper analyzes performance of MEGACO (Media Gateway Control Protocol) based on Diameter which is an Authentication, Authorization,andAccounting (AAA) protocol developed withi...
Pedram Hajipour, Kolsoom Abbasi Shahkooh
ECSCW
2011
13 years 10 months ago
Flypad: Designing Trajectories in a Large-Scale Permanent Augmented Reality Installation
A long-term naturalistic study reveals how artists designed, visitors experienced, and curators and technicians maintained a public interactive artwork over a four year period. The...
Martin Flintham, Stuart Reeves, Patrick Brundell, ...
75
Voted
ICC
2009
IEEE
139views Communications» more  ICC 2009»
14 years 8 months ago
A Fluid Background Traffic Model
Background traffic has a significant impact on the behavior of network services and protocols. However, a detailed model of the background traffic can be extremely time consuming i...
Ting Li, Jason Liu