Sciweavers

1639 search results - page 133 / 328
» Degree-constrained network flows
Sort
View
ICC
2007
IEEE
111views Communications» more  ICC 2007»
15 years 10 months ago
Automatically Segregating Greedy and Malicious Internet Flows
— In the current Internet, compliance with TCP congestion control rules is voluntary. Noncompliant flows can gain unfair performance advantages or deny service to other flows. ...
José Carlos Brustoloni, Shuo Chen
ICWE
2005
Springer
15 years 10 months ago
Identifying Websites with Flow Simulation
We present in this paper a method to discover the set of webpages contained in a logical website, based on the link structure of the Web graph. Such a method is useful in the conte...
Pierre Senellart
ICAISC
2004
Springer
15 years 9 months ago
On Application of Ant Algorithms to Non-bifurcated Multicommodity Flow Problem
Our discussion in this article centers on the application of ant algorithms to the non-bifurcated multicommodity flow problem. We propose a general framework of ant algorithm that...
Krzysztof Walkowiak
ACSAC
2003
IEEE
15 years 9 months ago
Experimenting with a Policy-Based HIDS Based on an Information Flow Control Model
In [1], we proposed a model for policy-based intrusion detection, based on information flow control. In the present paper, we show its applicability and effectiveness on a stand...
Jacob Zimmermann, Ludovic Mé, Christophe Bi...
IV
2002
IEEE
121views Visualization» more  IV 2002»
15 years 9 months ago
Visualising a Fund Manager Flow Graph with Columns and Worms
This paper describes a paradigm for visualising time deflow in a network of objects connected by abstract relationships (a graph) by representing time in the third dimension. We ...
Tim Dwyer, Peter Eades