Sciweavers

1657 search results - page 134 / 332
» Network flow spanners
Sort
View
SIAMAM
2008
91views more  SIAMAM 2008»
13 years 10 months ago
A Fluid Dynamic Model for Telecommunication Networks with Sources and Destinations
This paper proposes a macroscopic fluid dynamic model dealing with the flows of information on a telecommunication network with sources and destinations. The model consists of a co...
Ciro D'Apice, Rosanna Manzo, Benedetto Piccoli
DSOM
2003
Springer
14 years 4 months ago
Idiosyncratic Signatures for Authenticated Execution of Management Code
TrustedFlow™ is a software solution to the problem of remotely authenticating code during execution. A continuous flow of idiosyncratic signatures assures that the software from ...
Mario Baldi, Yoram Ofek, Moti Yung
LCN
2000
IEEE
14 years 3 months ago
Intra-domain Bandwidth Management in Differentiated Services Network
In absence of any link layer traffic controls or priorityqueuing mechanism in LAN infrastructure (such as shared media LAN), Subnet Bandwidth Management based approach of managing...
Sanjay Jha, Mahbub Hassan, Priyadarsi Nanda, Nadee...
RSP
2000
IEEE
100views Control Systems» more  RSP 2000»
14 years 2 months ago
A Hardware Virtual Machine for the Networked Reconfiguration
Networked reconfiguration is an enabling technology for cost effective service deployment and maintenance. A hardware virtual machine to enable this networked reconfigurapresented...
Yajun Ha, Patrick Schaumont, Marc Engels, Serge Ve...
PE
2008
Springer
114views Optimization» more  PE 2008»
13 years 10 months ago
An efficient technique to analyze the impact of bursty TCP traffic in wide-area networks
In this paper we describe an analytical technique for the performance evaluation of wide-area networks carrying realistic TCP traffic, such as that produced by a large number of f...
Michele Garetto, Donald F. Towsley