<--- Back to Details
First PageDocument Content
Network protocols / Network architecture / Network theory / Network flow / Route assignment / Transportation planning / Delay-tolerant networking / Routing / Flow network / Graph theory / Mathematics / Theoretical computer science
Date: 2011-10-03 14:09:14
Network protocols
Network architecture
Network theory
Network flow
Route assignment
Transportation planning
Delay-tolerant networking
Routing
Flow network
Graph theory
Mathematics
Theoretical computer science

Wardrop Equilibrium Formulation of Resource-Constrained DTN Routing in Public Safety Networks Pierre-Ugo Tournoux!, Vania Conan!, Jon Crowcroft† , J´er´emie Leguay!, Marcelo Dias de Amorim‡ , and Farid Benbadis! !

Add to Reading List

Source URL: jeremie.leguay.free.fr

Download Document from Source Website

File Size: 351,85 KB

Share Document on Facebook

Similar Documents

Resistive Network Optimal Power Flow: Uniqueness and Algorithms Chee Wei Tan, Senior Member, IEEE, Desmond W. H. Cai, Student Member, IEEE and Xin Lou Abstract—The optimal power flow (OPF) problem minimizes the power l

Resistive Network Optimal Power Flow: Uniqueness and Algorithms Chee Wei Tan, Senior Member, IEEE, Desmond W. H. Cai, Student Member, IEEE and Xin Lou Abstract—The optimal power flow (OPF) problem minimizes the power l

DocID: 1vid6 - View Document

Introduction Network similarity problem Results Acknowledgements  Spectra of the Spike Flow Graphs of Recurrent

Introduction Network similarity problem Results Acknowledgements Spectra of the Spike Flow Graphs of Recurrent

DocID: 1veQT - View Document

An Arrow-Hurwicz-Uzawa Type Flow as Least Squares Solver for Network Linear Equations Yang Liu, Christian Lageman, Brian D. O. Anderson, and Guodong Shi∗ arXiv:1701.03908v1 [cs.SY] 14 Jan 2017

An Arrow-Hurwicz-Uzawa Type Flow as Least Squares Solver for Network Linear Equations Yang Liu, Christian Lageman, Brian D. O. Anderson, and Guodong Shi∗ arXiv:1701.03908v1 [cs.SY] 14 Jan 2017

DocID: 1uJ5N - View Document

Pipe Network  Hand-in Assignment 1 Flow in Water Pipe Network   

Pipe Network Hand-in Assignment 1 Flow in Water Pipe Network  

DocID: 1uInK - View Document

Inductive Intrusion Detection in Flow-Based Network Data using One-Class Support Vector Machines Philipp Winter

Inductive Intrusion Detection in Flow-Based Network Data using One-Class Support Vector Machines Philipp Winter

DocID: 1uIen - View Document