Capacity factors in a point-to-point network

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Capacity Factors of a Point-to-point Network

In this paper, we investigate some properties on capacity factors, which were proposed to investigate the link failure problem from network coding. A capacity factor (CF) of a network is an edge set, deleting which will cause the maximum flow to decrease while deleting any proper subset will not. Generally, a k-CF is a minimal (not minimum) edge set which will cause the network maximum flow dec...

متن کامل

Broadcast Methods in the Multiswitch Point-to-Point Network

The Multiswitch project at Purdue University is investigating broadcast techniques for use in point-to-point networks. This paper analyzes four techniques for delivery of a broadcast message to all processors in a network. The current Multi-switch prototype network uses one of these techniques, called Flooding with Duplicate Discard (FDD). FDD is attractive because it provides high reliability ...

متن کامل

Capacity of Byzantine Consensus with Capacity-Limited Point-to-Point Links

Any opinions, findings, and conclusions or recommendations expressed here are those of the authors and do not necessarily reflect the views of the funding agencies or the U.S. government.

متن کامل

The overall efficiency and projection point in network DEA

Data Envelopment Analysis (DEA) is one of the best methods for measuring the efficiency and productivity of Decision Making Units (DMU). Evaluating the efficiency of DMUs which have two or several stages by using the conventional DEA models, is equal to consider them as black box. This method, omits the effect of intermediate measure on efficiency. Therefore, just the first network inputs and t...

متن کامل

Network Working Group Point-to-point Protocol (ppp) Vendor Protocol

Some implementors may want to define proprietary network and control protocols in addition to the already-described features. While it would be possible for such an implementor to use the existing LCP Vendor-Specific Option to enable the use of the proprietary protocol, this staged negotiation (enable via LCP, then negotiate via some locally-assigned protocol number) suffers from at least three...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Information Sciences

سال: 2014

ISSN: 0020-0255

DOI: 10.1016/j.ins.2014.06.048