Sciweavers

CORR
2002
Springer
98views Education» more  CORR 2002»
15 years 15 days ago
Fast optical layer mesh protection using pre-cross-connected trails
Conventional optical networks are based on SONET rings, but since rings are known to use bandwidth inefficiently, there has been much research into shared mesh protection, which pr...
Timothy Y. Chow, Fabián A. Chudak, Anthony ...
63
Voted
CORR
2002
Springer
87views Education» more  CORR 2002»
15 years 15 days ago
Packet delay in models of data networks
Henryk Fuks, Anna T. Lawniczak, Stanislav Volkov
60
Voted
CORR
2002
Springer
96views Education» more  CORR 2002»
15 years 15 days ago
Reinforcing Reachable Routes
Srinidhi Varadarajan, Naren Ramakrishnan
CORR
2002
Springer
112views Education» more  CORR 2002»
15 years 15 days ago
A Calculus for End-to-end Statistical Service Guarantees
The deterministic network calculus offers an elegant framework for determining delays and backlog in a network with deterministic service guarantees to individual traffic flows. T...
Almut Burchard, Jörg Liebeherr, Stephen D. Pa...
82
Voted
CORR
2002
Springer
104views Education» more  CORR 2002»
15 years 15 days ago
Intelligent Search of Correlated Alarms for GSM Networks with Model-based Constraints
In order to control the process of data mining and focus on the things of interest to us, many kinds of constraints have been added into the algorithms of data mining. However, di...
Qingguo Zheng, Ke Xu, Weifeng Lv, Shilong Ma
105
Voted
CORR
2002
Springer
122views Education» more  CORR 2002»
15 years 15 days ago
Fair Stateless Aggregate Traffic Marking using Active Queue Management Techniques
Abstract--In heterogeneous networks such as today's Internet, the differentiated services architecture promises to provide QoS guarantees through scalable service differentiat...
Abhimanyu Das, Debojyoti Dutta, Ahmed Helmy
99
Voted
CORR
2002
Springer
92views Education» more  CORR 2002»
15 years 15 days ago
Source Routing and Scheduling in Packet Networks
We study routing and scheduling in packet-switched networks. We assume an adversary that controls the injection time, source, and destination for each packet injected. A set of pat...
Matthew Andrews, Antonio Fernández, Ashish ...
51
Voted
CORR
2002
Springer
103views Education» more  CORR 2002»
15 years 15 days ago
Analysis of Non-Gaussian Nature of Network Traffic
Tatsuya Mori, Ryoichi Kawahara, Shozo Naito
112
Voted
CORR
2002
Springer
111views Education» more  CORR 2002»
15 years 15 days ago
Increasing Evolvability Considered as a Large-Scale Trend in Evolution
Evolvability is the capacity to evolve. This paper introduces a simple computational model of evolvability and demonstrates that, under certain conditions, evolvability can increa...
Peter D. Turney
97
Voted
CORR
2002
Springer
180views Education» more  CORR 2002»
15 years 15 days ago
Non-negative sparse coding
Abstract. Non-negative sparse coding is a method for decomposing multivariate data into non-negative sparse components. In this paper we briefly describe the motivation behind this...
Patrik O. Hoyer