Sciweavers

1657 search results - page 250 / 332
» Network flow spanners
Sort
View
ISF
2010
164views more  ISF 2010»
13 years 6 months ago
An SVM-based machine learning method for accurate internet traffic classification
Accurate and timely traffic classification is critical in network security monitoring and traffic engineering. Traditional methods based on port numbers and protocols have proven t...
Ruixi Yuan, Zhu Li, Xiaohong Guan, Li Xu
MOBISYS
2008
ACM
14 years 8 months ago
Composcan: adaptive scanning for efficient concurrent communications and positioning with 802.11
Using 802.11 concurrently for communications and positioning is problematic, especially if location-based services (e.g., indoor navigation) are concurrently executed with real-ti...
Mikkel Baun Kjærgaard, Thomas King
NOMS
2000
IEEE
118views Communications» more  NOMS 2000»
14 years 1 months ago
On the enhancement of a differentiated services scheme
Simple Integrated Media Access (SIMA) is a differentiated service scheme based on drop preference bits in every packet. The basic idea of the SIMA is to maximize the exploitation ...
Runtong Zhang, Jian Ma
IPPS
2010
IEEE
13 years 6 months ago
Stability of a localized and greedy routing algorithm
Abstract--In this work, we study the problem of routing packets between undifferentiated sources and sinks in a network modeled by a multigraph. We consider a distributed and local...
Christelle Caillouet, Florian Huc, Nicolas Nisse, ...
STOC
2002
ACM
111views Algorithms» more  STOC 2002»
14 years 9 months ago
The price of anarchy is independent of the network topology
We study the degradation in network performance caused by the selfish behavior of noncooperative network users. We consider a model of selfish routing in which the latency experie...
Tim Roughgarden