نتایج جستجو برای: network flows

تعداد نتایج: 741721  

2004
Hamada Alshaer Eric Horlait

An end to end (e2e) packet delay jitter has a negative impact on the offered QoS in IP networks. Therefore, in this paper we clarify this passive impact, and discuss the delay jitter that is based on the analysis done in [1]. However, here we focus on the expedited forwarding (EF) class in the differentiated services network (DiffServ). EF flows are represented by renewal periodic ON-OFF flows,...

2008
Martin Skutella

We give an introduction into the fascinating area of flows over time—also called “dynamic flows” in the literature. Starting from the early work of Ford and Fulkerson on maximum flows over time, we cover many exciting results that have been obtained over the last fifty years. One purpose of this chapter is to serve as a possible basis for teaching network flows over time in an advanced course o...

2007
Kotaro YAGI Hiroyuki OHSAKI Makoto IMASE

In recent years, it has been reported that several existing networks represented by the Internet have scale-free structure. In this paper, through simulation experiments, we investigate the effect of the scale-free structure of communication networks on the end-to-end performance of TCP flows. As a network topology, a random network and a scale-free network with the equal number of nodes and th...

1999
Shigang Chen Klara Nahrstedt

Multiple classes of conventional and multimedia applications are expected to be supported by the emerging connection-oriented integrated-service networks, where bestefJort flows and quality-of-service (QoS) flows co-exist. We propose a novel two-level hierarchical scheduling algorithm, which provides an integrated, simple scheme to distribute the link bandwidth among a dynamic set of flows in t...

2017
MARK NEWMAN Christian Persson Ludvig Bohlin Daniel Edler Martin Rosvall

To comprehend the flows of ideas or information through social and biological systems, researchers develop maps that reveal important patterns in network flows. In practice, network flow models have implied conventional firstorder dynamics, but recently researchers have introduced higher-order network flow models, including memory and multilayer networks, to capture patterns in multi-step pathw...

2004
Dola Saha Siuli Roy Somprakash Bandyopadhyay Tetsuro Ueda Shinsuke Tanaka

Medium Access Control protocols proposed in the context of ad hoc networks primarily aim to control the medium access among contending nodes using some contention resolution schemes. However, these protocols do not necessarily guarantee a fair allocation of wireless medium among contending flows. Our objective in this paper is to adaptively adjust the flow-rates of contending flows, so that eac...

Mobile ad hoc network congestion control is a significant problem. Standard mechanism for congestion control (TCP), the ability to run certain features of a wireless network, several mutations are not common. In particular, the enormous changes in the network topology and the joint nature of the wireless network. It also creates significant challenges in mobile ad hoc networks (MANET), density ...

, ,

Soil erosion is of the most important environmental challenges and factors of forest damage, which is, occur because of the land use change, road construction and lack of vegetation cover. Forest soil is naturally penetrable but forest roads are not. This issue causes the flows runoff on road surface and washes soil particles. Thus, forest roads must be planned and constructed accurately. So, t...

Journal: :CoRR 2017
Ramin Soltani Dennis Goeckel Donald F. Towsley Amir Houmansadr

Network traffic analysis reveals important information even when messages are encrypted. We consider active traffic analysis via flow fingerprinting by invisibly embedding information into packet timings of flows. In particular, assume Alice wishes to embed fingerprints into flows of a set of network input links, whose packet timings are modeled by Poisson processes, without being detected by a...

2006
Michael M. Gorlick

We speculate that computational exchanges will evolve from short-lived, intermittent transactions to long-lived flows—repeated transfers of information, constrained in space, time, and domain, from one network point to another. Flows whose lifespans are measured in hours to months will be common and their delivery and manipulation will rank, as elements of infrastructure, equal in importance to...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید