2012 Proceedings IEEE INFOCOM 2012
DOI: 10.1109/infcom.2012.6195830
|View full text |Cite
|
Sign up to set email alerts
|

How to split a flow?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
56
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 47 publications
(56 citation statements)
references
References 11 publications
0
56
0
Order By: Relevance
“…Step 3: X' 'in each of the data defined in the previous definition 3 to calculate the corresponding influence, and finally take m' of the corresponding behavior of the corresponding data as the evaluation of the value of the user behavior E: (8) Because the evaluation method reflects the degree of influence of the user behavior and the change of the network state, the evaluation value is helpful to discover the users who cause the network state change, and can control, encourage or suspend the users with different influence and encounter the risk.…”
Section: User Behavior Assessment Processmentioning
confidence: 99%
“…Step 3: X' 'in each of the data defined in the previous definition 3 to calculate the corresponding influence, and finally take m' of the corresponding behavior of the corresponding data as the evaluation of the value of the user behavior E: (8) Because the evaluation method reflects the degree of influence of the user behavior and the change of the network state, the evaluation value is helpful to discover the users who cause the network state change, and can control, encourage or suspend the users with different influence and encounter the risk.…”
Section: User Behavior Assessment Processmentioning
confidence: 99%
“…As in [26], the greedy algorithm is shown to have the best performance. The flow decomposition problem has also been studied in [14]. Its main contribution is an approximation algorithm that decomposes all but an ǫ-fraction of a flow into at most O(1/ǫ 2 ) times the smallest possible number of decomposed paths.…”
Section: Related Workmentioning
confidence: 99%
“…To tackle the second problem, the number of paths should be kept as low as possible, thus reducing the overhead caused by additional table entries and control messages [15]. A practical approach for embedding a virtual link into multiple paths can be achieved by using a multicommodity flow formulation.…”
Section: B Multipath Concernsmentioning
confidence: 99%
“…A practical approach for embedding a virtual link into multiple paths can be achieved by using a multicommodity flow formulation. Yet, although such approaches yield good solutions, they generate an unpredictable number of paths [15]. Therefore, any solution for assigning virtual links to multiple paths should be upper bounded, thus allowing better control over the outcome of the embedding phase.…”
Section: B Multipath Concernsmentioning
confidence: 99%
See 1 more Smart Citation