Sciweavers

1657 search results - page 53 / 332
» Network flow spanners
Sort
View
CIKM
2009
Springer
15 years 10 months ago
On optimising personal network size to manage information flow
PN refer to the set of ties a specific individual has with other people. There is significant variation in the size of an individual’s PN and this paper explores the effect o...
Yu-En Lu, Sam Roberts, Tammy M. K. Cheng, Robin Du...
116
Voted
ICS
2010
Tsinghua U.
16 years 24 days ago
A New Look at Selfish Routing
: We revisit price of anarchy in network routing, in a new model in which routing decisions are made by self-interested components of the network, as opposed to by the flows as in ...
Christos Papadimitriou, Gregory Valiant
CCR
2006
114views more  CCR 2006»
15 years 3 months ago
A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification
The identification of network applications through observation of associated packet traffic flows is vital to the areas of network management and surveillance. Currently popular m...
Nigel Williams, Sebastian Zander, Grenville J. Arm...
131
Voted
SSD
2009
Springer
170views Database» more  SSD 2009»
15 years 10 months ago
Discovering Teleconnected Flow Anomalies: A Relationship Analysis of Dynamic Neighborhoods (RAD) Approach
Given a collection of sensors monitoring a flow network, the problem of discovering teleconnected flow anomalies aims to identify strongly connected
James M. Kang, Shashi Shekhar, Michael Henjum, Pai...
70
Voted
STOC
2007
ACM
93views Algorithms» more  STOC 2007»
16 years 3 months ago
Degree-constrained network flows
P. Donovan, F. Bruce Shepherd, Adrian Vetta, Gordo...