Flow network

Results: 2096



#Item
91Electrical engineering / Synchronization / Clock signal / Clock skew / Computing / Computer programming / Clock synchronization / Heap / Flow network / Distributed computing

Tight Bounds for Clock Synchronization [Extended Abstract] ∗ Christoph Lenzen

Add to Reading List

Source URL: disco.ethz.ch

Language: English - Date: 2014-09-26 08:36:32
92Graph theory / Mathematics / Routing algorithms / Edsger W. Dijkstra / Combinatorial optimization / Search algorithms / Game artificial intelligence / A* search algorithm / Shortest path problem / Flow network / Tree / Graph

Hardness and Approximation Results for Black Hole Search in Arbitrary Networks⋆ Ralf Klasing⋆⋆, Euripides Markou⋆ ⋆ ⋆ , Tomasz Radzik† , and Fabiano Sarracco‡ Abstract. A black hole is a highly harmful st

Add to Reading List

Source URL: emarkou.users.uth.gr

Language: English - Date: 2016-05-24 11:28:43
93Network theory / Graph theory / Mathematics / Physics / Centrality / Flow network / Shortest path problem / Climate as complex networks / Topology / Time-varying network

Ingo Scholtes, Nicolas Wider, Antonios Garas: Higher-Order Aggregate Networks in the Analysis of Temporal Networks Higher-Order Aggregate Networks in the Analysis of Temporal Networks: Path structures and centralities

Add to Reading List

Source URL: www.sg.ethz.ch

Language: English - Date: 2015-08-27 04:09:04
94Computing / Control flow / Eval / Sequence container / Software engineering / Security Target / Common Criteria

Item Title Supporting document ND – Evaluation Activities for Network Reviewer Device cPP -V0.3 Eunkyoung Yi

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2016-03-28 12:01:47
95Graph theory / Mathematics / Networks / Network theory / Discrete mathematics / Operations research / Centrality / Network analysis / Flow network / Belief propagation

Influence Propagation in Adversarial Setting: How to Defeat Competition with Least Amount of Investment Shahrzad Shirazipourazad, Brian Bogard, Harsh Vachhani, Arunabha Sen School of Computing, Informatics and Decision S

Add to Reading List

Source URL: web.cs.du.edu

Language: English - Date: 2012-09-21 17:55:11
96Computing / Network management / Information technology management / System software / NetFlow / SFlow / Traffic flow / Routing / Network traffic measurement / FlowMon

Automating Network Monitoring on Experimental Testbeds Michael Golightly Princeton University Abstract

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2011-07-08 13:42:24
97Computing / Media access control / Computer networking / Network architecture / Espionage / Carrier sense multiple access with collision avoidance / IEEE 802.11 / Covert channel / Carrier sense multiple access / Collision / Traffic flow / Channel access method

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 3, MARCHA Timing Channel Spyware for the CSMA/CA Protocol

Add to Reading List

Source URL: coleman.ucsd.edu

Language: English
98Computing / Network architecture / Data transmission / Flow control / Computer networking / Network protocols / Network performance / Transmission Control Protocol / Acknowledgement / Channel / Network packet / Packet loss

64 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 1, FEBRUARY 2012 Characterizing the Efficacy of the NRL Network Pump in Mitigating Covert Timing Channels

Add to Reading List

Source URL: coleman.ucsd.edu

Language: English
99Computing / Cryptography / Security / Prevention / Computer network security / Password / Cloud computing / Computer security / Cloud storage / File hosting service / Browser security / Salt

Media Shuttle’s Defense-inDepth Security Strategy Introduction When you are in the midst of the creative flow and tedious editorial process of a big project, the security of your files as they pass among the various pl

Add to Reading List

Source URL: info.signiant.com

Language: English - Date: 2016-07-16 02:23:51
100Security / Prevention / Cryptography / Crime prevention / Information governance / National security / Computer network security / Information flow / Database transaction / Computer security

Verifying information security of dynamic, decentralized systems Andrew Myers IC3 retreat, May 2016

Add to Reading List

Source URL: www.initc3.org

Language: English
UPDATE