Sciweavers

1657 search results - page 84 / 332
» Network flow spanners
Sort
View
IM
2007
13 years 11 months ago
Real-time Analysis of Flow Data for Network Attack Detection
— With the wide deployment of flow monitoring in IP networks, the analysis of the exported flow data has become an important research area. It has been shown that flow data ca...
Gerhard Münz, Georg Carle
CORR
2010
Springer
118views Education» more  CORR 2010»
13 years 10 months ago
Asymptotic Traffic Flow in an Hyperbolic Network II: Non-uniform Traffic
In this work we study the asymptotic traffic behaviour in Gromov's hyperbolic spaces when the traffic decays exponentially with the distance. We prove that under general condi...
Yuliy Baryshnikov, Gabriel H. Tucci
INFORMS
2010
125views more  INFORMS 2010»
13 years 8 months ago
Combining Exact and Heuristic Approaches for the Capacitated Fixed-Charge Network Flow Problem
We develop a solution approach for the fixed charge network flow problem (FCNF) that produces provably high-quality solutions quickly. The solution approach combines mathematica...
Mike Hewitt, George L. Nemhauser, Martin W. P. Sav...
SP
2007
IEEE
157views Security Privacy» more  SP 2007»
14 years 4 months ago
Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems
Many proposed low-latency anonymous communication systems have used various flow transformations such as traffic padding, adding cover traffic (or bogus packets), packet droppi...
Xinyuan Wang, Shiping Chen, Sushil Jajodia
CODES
2006
IEEE
14 years 4 months ago
Thermal-aware high-level synthesis based on network flow method
Lowering down the chip temperature is becoming one of the important design considerations, since temperature adversely and seriously affects many of design qualities, such as reli...
Pilok Lim, Taewhan Kim