منابع مشابه
Schemes and the IP-graph
We consider the common-divisor graph of the set of valencies of a naturally valenced scheme, where scheme is defined in the sense of P.-H. Zieschang. We prove structural results about this graph, and thus give restrictions on the set of natural numbers that can occur as the set of valencies of a naturally valenced scheme.
متن کاملMultilevel Graph Partitioning Schemes
In this paper we present experiments with a class of graph partitioning algorithms that reduce the size of the graph by collapsing vertices and edges, partition the smaller graph, and then uncoarsen it to construct a partition for the original graph. We investigate the effectiveness of many different choices for all three phases: coarsening, partition of the coarsest graph, and refinement. In p...
متن کاملCongestion Control Schemes for TCP/IP Networks
This paper describes six methods for controlling congestion for TCP connections. The first four, Slow Start algorithm [5], Tri-S [8], DUAL [7], and TCP Vegas [1] treat the network as a black box, in that the only way to detect congestion is through packet loss and changes in round trip time, or throughput. The last two, Random Early Detection [4] and Explicit Congestion Notification [3] depend ...
متن کاملBinary search schemes for fast IP lookups
IP route look up is the most time consuming operation of a router. Route lookup is becoming a very challenging problem due to the increasing size of routing tables. To reduce the number of entries, routing tables store variable length address prefixes. To determine the outgoing port for a given address, the longest matching prefix amongst all the prefixes, needs to be determined. This makes the...
متن کاملVulnerabilities in distance-indexed IP traceback schemes
In order to counter Denial-of-Service (DoS) attacks using spoofed source addresses, many IP traceback schemes have been proposed in the last few years. Among them, distanceindexed probabilistic packet marking schemes appear to be very attractive. In this paper, we first discover two intrinsic vulnerabilities in these schemes. Substantiated by efficacy analysis and numerical results, several exp...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Algebraic Combinatorics
سال: 2007
ISSN: 0925-9899,1572-9192
DOI: 10.1007/s10801-007-0102-3