Flow network

Results: 2096



#Item
421Networks / Operations research / Network analysis / Algebraic graph theory / Centrality / Betweenness centrality / Exponential distribution / Flow network / Network science / Graph theory / Network theory / Mathematics

Co-evolution of density and topology in a simple model of city formation Marc Barth´elemy1, 2 and Alessandro Flammini3 1 arXiv:0810.1376v1 [physics.soc-ph] 8 Oct 2008

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2013-02-23 15:27:19
422Connectivity / Flow network / Topology / Distributed data storage / Tango tree / Push-relabel maximum flow algorithm / Graph theory / Mathematics / Network flow

Chapter 15 Dynamic Networks Many large-scale distributed systems and networks are dynamic. In some networks, e.g., peer-to-peer, nodes participate only for a short period of time, and the topology can change at a high r

Add to Reading List

Source URL: dcg.ethz.ch

Language: English - Date: 2014-09-26 08:28:47
423Bipartite graph / Flow network / Graph operations / Graph theory / Parliamentary procedure / Quorum

The Quorum Deployment Problem (Extended Abstract) Seth Gilbert1 and Grzegorz Malewicz2 1 Massachusetts Institute of Technology

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2007-09-28 06:21:18
424SCADA / Cyberwarfare / Computer network security / Automation / Stuxnet / Distributed firewall / Smart grid / Control system security / Technology / Telemetry / Industrial automation

Secure your Distributed Automation Assets The emerging Internet of Things applications require distributed connectivity to the automation devices while preserving the security of the data-flow. RADiFlow provides secure c

Add to Reading List

Source URL: www.scra.org

Language: English - Date: 2014-11-25 16:18:23
425Group theory / Order / Optimization problem / NP-complete problems / Network flow / Combinatorial optimization / Theoretical computer science / Mathematics / Computational complexity theory

CCCG 2014, Halifax, Nova Scotia, August 11–13, 2014 A PTAS for the continuous 1.5D Terrain Guarding Problem Stephan Friedrichs∗ Michael Hemmer∗

Add to Reading List

Source URL: www.cccg.ca

Language: English - Date: 2014-07-28 18:32:50
426Embedded Linux / Smartphones / Android / Application programming interface / Apache Ant / Java / Application software / Flow network / Software / Computing / Cross-platform software

SPARTA! Static Program Analysis for Reliable Trusted Apps http://types.cs.washington.edu/sparta/ VersionAprilDo not distribute.

Add to Reading List

Source URL: types.cs.washington.edu

Language: English - Date: 2013-04-03 13:53:43
427Internet broadcasting / Digital television / Internet television / Multimedia / Peercasting / Streaming media / Unicast / Traffic flow / IP address / Concurrent computing / Computing / Network architecture

Microsoft Word - On Air Content Distribution.doc

Add to Reading List

Source URL: www.dveo.com

Language: English - Date: 2013-11-04 15:37:53
428System software / Port scanner / Universal Plug and Play / Transmission Control Protocol / User Datagram Protocol / Portmap / Port / SOCKS / Traffic flow / Computing / Internet protocols / Network architecture

SnortALog V2.4.1 The log begins at : The log ends at : Sep 17 15:47:16 Dec 1 00:06:06

Add to Reading List

Source URL: jeremy.chartier.free.fr

Language: English - Date: 2011-03-29 05:46:57
429Network theory / Graph connectivity / Shortest path problem / Graph / Degree / Matching / Maximum flow problem / Connected component / Tree / Graph theory / Mathematics / Theoretical computer science

Finding Shortest Non-Trivial Cycles ∗ in Directed Graphs on Surfaces Sergio Cabello Éric Colin de Verdière

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2010-04-01 04:31:48
430Network flow / Computer network security / Crime prevention / Electronic commerce / National security / Flow network / Vulnerability / Multilevel security / Constraint satisfaction / Computer security / Security / Cyberwarfare

A Soft Constraint-based Approach to the Cascade Vulnerability Problem Stefano Bistarelli Istituto di Informatica e Telematica, CNR, Pisa, Italy

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2006-08-23 05:01:39
UPDATE