Sciweavers

1639 search results - page 56 / 328
» Degree-constrained network flows
Sort
View
IFIP
2009
Springer
13 years 9 months ago
Consistency Analysis of Network Traffic Repositories
Traffic repositories with TCP/IP header information are very important for network analysis. Researchers often assume that such repositories reliably represent all traffic that has...
Elmer Lastdrager, Aiko Pras
CIKM
2009
Springer
14 years 5 months ago
On optimising personal network size to manage information flow
PN refer to the set of ties a specific individual has with other people. There is significant variation in the size of an individual’s PN and this paper explores the effect o...
Yu-En Lu, Sam Roberts, Tammy M. K. Cheng, Robin Du...
ICS
2010
Tsinghua U.
14 years 8 months ago
A New Look at Selfish Routing
: We revisit price of anarchy in network routing, in a new model in which routing decisions are made by self-interested components of the network, as opposed to by the flows as in ...
Christos Papadimitriou, Gregory Valiant
CCR
2006
114views more  CCR 2006»
13 years 11 months ago
A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification
The identification of network applications through observation of associated packet traffic flows is vital to the areas of network management and surveillance. Currently popular m...
Nigel Williams, Sebastian Zander, Grenville J. Arm...
SSD
2009
Springer
170views Database» more  SSD 2009»
14 years 5 months ago
Discovering Teleconnected Flow Anomalies: A Relationship Analysis of Dynamic Neighborhoods (RAD) Approach
Given a collection of sensors monitoring a flow network, the problem of discovering teleconnected flow anomalies aims to identify strongly connected
James M. Kang, Shashi Shekhar, Michael Henjum, Pai...