Sciweavers

230 search results - page 30 / 46
» host 2009
Sort
View
INFOCOM
2009
IEEE
14 years 2 months ago
On the Effectiveness of Measurement Reuse for Performance-Based Detouring
— For both technological and economic reasons, the default path between two end systems in the wide-area Internet can be suboptimal. This observation has motivated a number of sy...
David R. Choffnes, Fabian E. Bustamante
BICOB
2009
Springer
14 years 2 months ago
Generalized Binary Tanglegrams: Algorithms and Applications
Several applications require the joint display of two phylogenetic trees whose leaves are matched by inter-tree edges. This issue arises, for example, when comparing gene trees and...
Mukul S. Bansal, Wen-Chieh Chang 0002, Oliver Eule...
WAW
2009
Springer
150views Algorithms» more  WAW 2009»
14 years 2 months ago
The Giant Component in a Random Subgraph of a Given Graph
We consider a random subgraph Gp of a host graph G formed by retaining each edge of G with probability p. We address the question of determining the critical value p (as a function...
Fan Chung Graham, Paul Horn, Linyuan Lu
WAW
2009
Springer
136views Algorithms» more  WAW 2009»
14 years 2 months ago
Permuting Web Graphs
Since the first investigations on web graph compression, it has been clear that the ordering of the nodes of the graph has a fundamental influence on the compression rate (usuall...
Paolo Boldi, Massimo Santini, Sebastiano Vigna
ICICS
2009
Springer
14 years 2 months ago
Assessing Security Risk to a Network Using a Statistical Model of Attacker Community Competence
We propose a novel approach for statistical risk modeling of network attacks that lets an operator perform risk analysis using a data model and an impact model on top of an attack ...
Tomas Olsson