Flow network

Results: 2096



#Item
351Data / TCP/IP / Flow control / TCP congestion avoidance algorithm / Computer networking / Additive increase/multiplicative decrease / Transmission Control Protocol / Network congestion / TCP Vegas / Computing / Network performance / Network architecture

General AIMD Congestion Control ∗ Yang Richard Yang, Simon S. Lam Department of Computer Sciences The University of Texas at Austin Austin, TXE-mail: {yangyang,lam}@cs.utexas.edu

Add to Reading List

Source URL: www-net.cs.yale.edu

Language: English - Date: 2001-09-25 15:16:20
352Parallel computing / Cloud infrastructure / Apache Hadoop / Network performance / MapReduce / Computer cluster / Network congestion / Flow network / Azure Services Platform / Computing / Concurrent computing / Cloud computing

Transparent and Flexible Network Management for Big Data Processing in the Cloud Anupam Das¶ , Cristian Lumezanu♯ , Yueping Zhang♯ , Vishal Singh♯ , Guofei Jiang♯ , Curtis Yu♮ ¶ UIUC ♯ NEC Labs ♮ UC River

Add to Reading List

Source URL: web.engr.illinois.edu

Language: English - Date: 2013-05-14 14:59:33
353Network theory / Connectivity / Graph / Gossip protocol / Shortest path problem / Network flow / Centrality / Graph coloring / Mathematics / Theoretical computer science / Graph theory

The worst case behavior of randomized gossip? H. Baumann1 , P. Fraigniaud1 , H. A. Harutyunyan2 , and R. de Verclos3 1 LIAFA, CNRS and University Paris Diderot, France. 2

Add to Reading List

Source URL: www.liafa.jussieu.fr

Language: English - Date: 2012-04-26 12:00:46
354Internet / Routing protocols / Denial-of-service attacks / IP traceback / Denial-of-service attack / Router / IP address spoofing / Traffic flow / Protocol Independent Multicast / Computing / Network architecture / Computer network security

You Can Run, But You Can’t Hide: An Effective Methodology to Traceback DDoS Attackers K.T. Law Department of Computer Science & Engineering The Chinese University of

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2004-06-10 15:32:10
355Technology / Wireless ad-hoc network / Rope / Peer-to-peer / Flow network / Wireless sensor network / Wireless networking / Graph theory / Network flow

A Game Theoretic Analysis on Incentive Mechanisms for Wireless Ad Hoc VoD Systems ∗ Dept. † National

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2012-05-09 20:33:45
356Graph / Directed graph / Connectivity / Tree / Degree / Flow network / Line graph / Signed graph / Graph theory / Mathematics / Graph operations

Space Lower Bounds for Graph Exploration via Reduced Automata Pierre Fraigniaud1 , David Ilcinkas1 , Sergio Rajsbaum2 , and S´ebastien Tixeuil1 1 2

Add to Reading List

Source URL: www.liafa.jussieu.fr

Language: English - Date: 2007-01-17 10:04:45
357Science / Simulation / Computer simulation / Mathematical optimization / Flow network / Program optimization / Evacuation process simulation / AnyLogic / Operations research / Applied mathematics / Software

Combining pedestrian simulation with a network flow optimization to support security staff in handling an evacuation of a soccer stadium Angelika Kneidl1, Markus Thiemann2, Dirk Hartmann3, André Borrmann1 1

Add to Reading List

Source URL: www.cms.bgu.tum.de

Language: English - Date: 2014-12-18 07:59:05
358Operations research / Network flow / Mathematical optimization / Maximum flow problem / Shortest path problem / Optimal control / Flow network / Graph / Dynamic programming / Mathematics / Graph theory / Theoretical computer science

New complexity results for time-constrained dynamical optimal path problems

Add to Reading List

Source URL: www.emis.ams.org

Language: English - Date: 2010-02-01 11:59:55
359OSI protocols / Transmission Control Protocol / Bandwidth management / Network congestion / Traffic flow / Network performance / Computing / Network architecture

In Commercial Deployment A internet traffic end-to-end from any 1 point in TCP path control at bandwidth bottlenecks to

Add to Reading List

Source URL: www.jin-magic.com

Language: English - Date: 2014-02-28 00:43:12
360Computer network security / Computer networking / Cyberwarfare / Data security / Firewall / Packet Processing / Netfilter / Network address translation / Traffic flow / Computing / Network architecture / System software

OpenNF: Enabling Innovation in Network Function Control Aaron Gember-Jacobson, Raajay Viswanathan, Chaithan Prakash, Robert Grandl, Junaid Khalid, Sourav Das, and Aditya Akella University of Wisconsin-Madison {agember,ra

Add to Reading List

Source URL: agember.com

Language: English - Date: 2014-07-07 17:03:14
UPDATE