Schemes and the IP-graph

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Schemes and the IP-graph

We consider the common-divisor graph of the set of valencies of a naturally valenced scheme, where scheme is defined in the sense of P.-H. Zieschang. We prove structural results about this graph, and thus give restrictions on the set of natural numbers that can occur as the set of valencies of a naturally valenced scheme.

متن کامل

Multilevel Graph Partitioning Schemes

In this paper we present experiments with a class of graph partitioning algorithms that reduce the size of the graph by collapsing vertices and edges, partition the smaller graph, and then uncoarsen it to construct a partition for the original graph. We investigate the effectiveness of many different choices for all three phases: coarsening, partition of the coarsest graph, and refinement. In p...

متن کامل

Congestion Control Schemes for TCP/IP Networks

This paper describes six methods for controlling congestion for TCP connections. The first four, Slow Start algorithm [5], Tri-S [8], DUAL [7], and TCP Vegas [1] treat the network as a black box, in that the only way to detect congestion is through packet loss and changes in round trip time, or throughput. The last two, Random Early Detection [4] and Explicit Congestion Notification [3] depend ...

متن کامل

Binary search schemes for fast IP lookups

IP route look up is the most time consuming operation of a router. Route lookup is becoming a very challenging problem due to the increasing size of routing tables. To reduce the number of entries, routing tables store variable length address prefixes. To determine the outgoing port for a given address, the longest matching prefix amongst all the prefixes, needs to be determined. This makes the...

متن کامل

Vulnerabilities in distance-indexed IP traceback schemes

In order to counter Denial-of-Service (DoS) attacks using spoofed source addresses, many IP traceback schemes have been proposed in the last few years. Among them, distanceindexed probabilistic packet marking schemes appear to be very attractive. In this paper, we first discover two intrinsic vulnerabilities in these schemes. Substantiated by efficacy analysis and numerical results, several exp...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Algebraic Combinatorics

سال: 2007

ISSN: 0925-9899,1572-9192

DOI: 10.1007/s10801-007-0102-3