Sciweavers

1639 search results - page 20 / 328
» Degree-constrained network flows
Sort
View
CVPR
2012
IEEE
12 years 1 months ago
A flow model for joint action recognition and identity maintenance
We propose a framework that performs action recognition and identity maintenance of multiple targets simultaneously. Instead of first establishing tracks using an appearance mode...
Sameh Khamis, Vlad I. Morariu, Larry S. Davis
INFOCOM
2010
IEEE
13 years 9 months ago
Deploying Mesh Nodes under Non-Uniform Propagation
Abstract—Wireless mesh networks are popular as a costeffective means to provide broadband connectivity to large user populations. A mesh network placement provides coverage, such...
Joshua Robinson, Mohit Singh, Ram Swaminathan, Edw...
ISCC
2006
IEEE
128views Communications» more  ISCC 2006»
14 years 5 months ago
Adjacent 2-Route Flow Approach for Restorable Dynamic Routing in MPLS Networks
In this paper we focus on issues of restorable dynamic routing in MPLS networks. We assume that the considered MPLS network must provide reliable service including restorable rout...
Krzysztof Walkowiak
SIGCOMM
2010
ACM
13 years 11 months ago
QuagFlow: partnering Quagga with OpenFlow
Computing history has shown that open, multi-layer hardware and software stacks encourage innovation and bring costs down. Only recently this trend is meeting the networking world...
Marcelo Ribeiro Nascimento, Christian Esteve Rothe...
SIGCOMM
2012
ACM
12 years 1 months ago
Finishing flows quickly with preemptive scheduling
Today’s data centers face extreme challenges in providing low latency. However, fair sharing, a principle commonly adopted in current congestion control protocols, is far from o...
Chi-Yao Hong, Matthew Caesar, Brighten Godfrey