Sciweavers

1639 search results - page 118 / 328
» Degree-constrained network flows
Sort
View
OSDI
2006
ACM
16 years 4 months ago
Making Information Flow Explicit in HiStar
HiStar is a new operating system designed to minimize the amount of code that must be trusted. HiStar provides strict information flow control, which allows users to specify preci...
David Mazières, Eddie Kohler, Nickolai Zeld...
JNW
2007
88views more  JNW 2007»
15 years 4 months ago
Integrated Proactive Admission Control Technique For both UDP And TCP Traffic Flows
—Real time traffic adopting UDP at the transport layer needs some quality of service. It is offered through an admission control scheme. This paper adopts one such scheme which i...
Lakshmanan Senthilkumar, Venkadachalam Sankaranara...
WCNC
2008
IEEE
15 years 10 months ago
Network Coding via Opportunistic Forwarding in Wireless Mesh Networks
— Network coding has been used to increase transportation capabilities in wireless mesh networks. In mesh networks, the coding opportunities depend on the co-location of multiple...
Jian Zhang, Yuanzhu Peter Chen, Ivan Marsic
INFOCOM
2009
IEEE
15 years 11 months ago
On Passive One-Way Loss Measurements Using Sampled Flow Statistics
—The ability to scalably measure one-way packet loss across different network paths is vital to IP network management. However, the effectiveness of active-measurement techniques...
Yu Gu, Lee Breslau, Nick G. Duffield, Subhabrata S...
NETCOOP
2009
Springer
15 years 11 months ago
User Association to Optimize Flow Level Performance in Wireless Systems with Dynamic Interference
We study the impact of user association policies on flow-level performance in interference limited wireless networks. Most research in this area has used static interference model...
Balaji Rengarajan, Gustavo de Veciana