Sciweavers

1639 search results - page 40 / 328
» Degree-constrained network flows
Sort
View
TMC
2008
179views more  TMC 2008»
13 years 11 months ago
Active Queue Management for Fair Resource Allocation in Wireless Networks
This paper investigates the interaction between end-to-end flow control and medium access control (MAC)-layer scheduling on wireless links. We consider a wireless network with mult...
Lachlan L. H. Andrew, Stephen V. Hanly, Rami G. Mu...
MOBICOM
2004
ACM
14 years 4 months ago
Characterizing flows in large wireless data networks
Several studies have recently been performed on wireless university campus networks, corporate and public networks. Yet little is known about the flow-level characterization in s...
Xiaoqiao Meng, Starsky H. Y. Wong, Yuan Yuan, Song...
JSAC
2008
121views more  JSAC 2008»
13 years 11 months ago
Network Coding Games with Unicast Flows
Abstract--To implement network coding, users need to coordinate and cooperate with respect to their strategies in terms of duplicating and transmitting side information across spec...
Jennifer Price, Tara Javidi
JACM
2007
121views more  JACM 2007»
13 years 11 months ago
(Almost) Tight bounds and existence theorems for single-commodity confluent flows
A flow of a commodity is said to be confluent if at any node all the flow of the commodity leaves along a single edge. In this paper we study single-commodity confluent flow pro...
Jiangzhuo Chen, Robert D. Kleinberg, Lászl&...
LCN
2005
IEEE
14 years 4 months ago
AntiWorm NPU-based Parallel Bloom Filters for TCP/IP Content Processing in Giga-Ethernet LAN
—TCP/IP protocol suite carries most application data in Internet. TCP flow retrieval has more security meanings than the IP packet payload. Hence, monitoring the TCP flow has mor...
Zhen Chen, Chuang Lin, Jia Ni, Dong-Hua Ruan, Bo Z...