Sciweavers

1639 search results - page 131 / 328
» Degree-constrained network flows
Sort
View
CISS
2008
IEEE
15 years 11 months ago
Identifying sufficient statistics in information networks
Abstract –Given a network targeting information transmission, this paper considers the problem of identifying a set of edges or nodes whose transmission is sufficient to determin...
Huaiyu Dai, Husheng Li
CCR
2005
96views more  CCR 2005»
15 years 4 months ago
A protocol for packet network intercommunication
-- A protocol that supports the sharing of resources that exist in different packet switching networks is presented. The protocol provides for variation in individual network packe...
Vinton G. Cerf, Robert E. Kahn
INFOCOM
2009
IEEE
15 years 11 months ago
Blind Detection of Spread Spectrum Flow Watermarks
— Recently, the direct sequence spread-spectrum (DSSS)-based technique has been proposed to trace anonymous network flows. In this technique, homogeneous pseudo-noise (PN) codes...
Weijia Jia, Fung Po Tso, Zhen Ling, Xinwen Fu, Don...
ACSAC
2006
IEEE
15 years 10 months ago
A General Dynamic Information Flow Tracking Framework for Security Applications
Many software security solutions require accurate tracking of control/data dependencies among information objects in network applications. This paper presents a general dynamic in...
Lap-Chung Lam, Tzi-cker Chiueh
SAFECOMP
2005
Springer
15 years 10 months ago
Control and Data Flow Testing on Function Block Diagrams
As programmable logic controllers(PLCs) have been used in safety-critical applications, testing of PLC applications has become important. The previous PLC-based software testing te...
Eunkyoung Jee, Junbeom Yoo, Sung Deok Cha