Sciweavers

1639 search results - page 186 / 328
» Degree-constrained network flows
Sort
View
ACSAC
2008
IEEE
15 years 11 months ago
Improving Security Visualization with Exposure Map Filtering
Flow based analysis of network traffic is commonly used to analyze and understand security-related events. Graphical analysis helps analysts detect patterns or behaviors that woul...
Mansour Alsaleh, David Barrera, Paul C. van Oorsch...
GCC
2003
Springer
15 years 10 months ago
Network Behavior Analysis Based on a Computer Network Model
This paper applies a new traffic model, iterated function systems (IFS) for network traffic modelling, to explore computer network behaviour and analyse network performance. IFS mo...
Weili Han, Shuai Dianxun, Yujun Liu
CISS
2007
IEEE
15 years 11 months ago
Bounding A Statistical Measure Of Network Lifetime For Wireless Sensor Networks
—The inherent many-to-one flow of traffic in Wireless Sensor Networks produces a skewed distribution of energy consumption rates leading to the early demise of those sensors that...
Muhammad Usman Ilyas, Hayder Radha
DMSN
2006
ACM
15 years 10 months ago
Network scheduling for data archiving applications in sensor networks
Since data archiving in sensor networks is a communication intensive application, a careful power management of communication is of critical importance for such networks. An examp...
Yong Yao, S. M. Nazrul Alam, Johannes Gehrke, Serg...
ICC
2007
IEEE
187views Communications» more  ICC 2007»
15 years 11 months ago
A Rate Control Scheme for Adaptive Video Streaming Over the Internet
—In this paper, we propose a new streaming protocol, namely Dynamic Video Rate Control (DVRC), which enables adaptive video delivery over the Internet. DVRC operates on top of UD...
Panagiotis Papadimitriou, Vassilis Tsaoussidis