Sciweavers

1639 search results - page 106 / 328
» Degree-constrained network flows
Sort
View
156
Voted
WWW
2007
ACM
16 years 4 months ago
Information flow modeling based on diffusion rate for prediction and ranking
Information flows in a network where individuals influence each other. The diffusion rate captures how efficiently the information can diffuse among the users in the network. We p...
Xiaodan Song, Yun Chi, Koji Hino, Belle L. Tseng
SAMOS
2007
Springer
15 years 10 months ago
Design Space Exploration of Configuration Manager for Network Processing Applications
—Current FPGAs provide a powerful platform for network processing applications. The main challenge is the exploitation of the reconfiguration to increase the performance of the s...
Christoforos Kachris, Stamatis Vassiliadis
IPOM
2009
Springer
15 years 10 months ago
Traffic Classification Based on Flow Similarity
Due to the various masquerading strategies adopted by newer P2P applications to avoid detection and filtering, well-known port mapping techniques cannot guarantee their accuracy an...
Jae Yoon Chung, Byungchul Park, Young J. Won, John...
ACSAC
2004
IEEE
15 years 8 months ago
Nabs: A System for Detecting Resource Abuses via Characterization of Flow Content Type
One of the growing problems faced by network administrators is the abuse of computing resources by authorized and unauthorized personnel. The nature of abuse may vary from using u...
Kulesh Shanmugasundaram, Mehdi Kharrazi, Nasir D. ...
ALENEX
2009
118views Algorithms» more  ALENEX 2009»
15 years 5 months ago
Solving Maximum Flow Problems on Real World Bipartite Graphs
In this paper we present an experimental study of several maximum flow algorithms in the context of unbalanced bipartite networks. Our experiments are motivated by a real world pr...
Cosmin Silvestru Negruseri, Mircea Bogdan Pasoi, B...