Sciweavers

1639 search results - page 164 / 328
» Degree-constrained network flows
Sort
View
151
Voted
MIDDLEWARE
2007
Springer
15 years 10 months ago
A multi-commodity flow approach to maximising utility in linked market-based grids
In this paper we consider the problem of maximising utility in linked market-driven distributed and Grid systems. In such systems, users submit jobs through brokers who can virtua...
James Broberg, Rajkumar Buyya
130
Voted
IWQOS
2005
Springer
15 years 10 months ago
Processor Sharing Flows in the Internet
Most congestion control algorithms try to emulate processor sharing (PS) by giving each competing flow an equal share of a bottleneck link. This approach leads to fairness, and pr...
Nandita Dukkipati, Masayoshi Kobayashi, Rui Zhang-...
AAAI
2007
15 years 7 months ago
Temporal and Information Flow Based Event Detection from Social Text Streams
Recently, social text streams (e.g., blogs, web forums, and emails) have become ubiquitous with the evolution of the web. In some sense, social text streams are sensors of the rea...
Qiankun Zhao, Prasenjit Mitra, Bi Chen
GCC
2003
Springer
15 years 9 months ago
An Improved Network Broadcasting Method Based on Gnutella Network
Peer-to-peer networking is a hot buzzword that has been sweeping through the computing industry over the past year or so. Gnutella, as one of the first operational pure P2P systems...
Zupeng Li, Xiubin Zhao, Daoyin Huang, Jianhua Huan...
142
Voted
ITIIS
2008
110views more  ITIIS 2008»
15 years 4 months ago
Fast Detection of Distributed Global Scale Network Attack Symptoms and Patterns in High-speed Backbone Networks
Traditional attack detection schemes based on packets or flows have very high computational complexity. And, network based anomaly detection schemes can reduce the complexity, but...
Sun Ho Kim, Byeong-hee Roh