Sciweavers

1657 search results - page 36 / 332
» Network flow spanners
Sort
View
DIALM
2008
ACM
139views Algorithms» more  DIALM 2008»
13 years 11 months ago
Approximating maximum integral flows in wireless sensor networks via weighted-degree constrained k-flows
We consider the Maximum Integral Flow with Energy Constraints problem: given a directed graph G = (V, E) with edge-weights {w(e) : e E} and node battery capacities {b(v) : v V }...
Zeev Nutov
COMCOM
2004
79views more  COMCOM 2004»
13 years 9 months ago
Fair bandwidth sharing between unicast and multicast flows in best-effort networks
In this paper, we propose a simple scheduler called SBQ (Service-Based Queuing) to share the bandwidth fairly between unicast and multicast flows according to a new definition of ...
Fethi Filali, Walid Dabbous
NETWORKS
2007
13 years 9 months ago
The maximum residual flow problem: NP-hardness with two-arc destruction
The maximum residual flow problem with one-arc destruction is shown to be solvable in strongly polynomial time in [Aneja et al., Networks, 38 (2001), 194-198.]. However the statu...
Donglei Du, R. Chandrasekaran
TCOM
2008
120views more  TCOM 2008»
13 years 9 months ago
Network Coding for Efficient Multicast Routing in Wireless Ad-hoc Networks
Network coding is a powerful coding technique that has been proved to be very effective in achieving the maximum multicast capacity. It is especially suited for new emerging networ...
Jingyao Zhang, Pingyi Fan, Khaled Ben Letaief
SIGCOMM
2010
ACM
13 years 10 months ago
Automating root-cause analysis of network anomalies using frequent itemset mining
Finding the root-cause of a network security anomaly is essential for network operators. In our recent work [1, 5], we introduced a generic technique that uses frequent itemset mi...
Ignasi Paredes-Oliva, Xenofontas A. Dimitropoulos,...