Results 1  10
of
1,720
Multiway cuts in node weighted graphs
 JOURNAL OF ALGORITHMS
, 2004
"... A (2 — 2/k) approximation algorithm is presented for the node multiway cut problem, thus matching the result of Dahlhaus et al. (SIAM J. Comput. 23 (4) (1994) 864894) for the edge version of this problem. This is done by showing that the associated LPrelaxation always has a halfintegral optimal s ..."
Abstract

Cited by 20 (0 self)
 Add to MetaCart
A (2 — 2/k) approximation algorithm is presented for the node multiway cut problem, thus matching the result of Dahlhaus et al. (SIAM J. Comput. 23 (4) (1994) 864894) for the edge version of this problem. This is done by showing that the associated LPrelaxation always has a halfintegral optimal
Multiway Cuts in Directed and Node Weighted Graphs
 in Proc. 21st ICALP, Lecture Notes in Computer Science 820
, 1994
"... this paper we consider node multiway cuts; the problem of computing a minimum weight node multiway cut is known to be NPhard and max SNPhard [1]. It turns out that the approximation algorithm in [2] for edge multiway cuts does not extend to the node multiway cut problem. Let us give a reason for t ..."
Abstract

Cited by 46 (4 self)
 Add to MetaCart
this paper we consider node multiway cuts; the problem of computing a minimum weight node multiway cut is known to be NPhard and max SNPhard [1]. It turns out that the approximation algorithm in [2] for edge multiway cuts does not extend to the node multiway cut problem. Let us give a reason
Myrinet: A GigabitperSecond Local Area Network
 IEEE Micro
, 1995
"... Abstract. Myrinet is a new type of localarea network (LAN) based on the technology used for packet communication and switching within "massivelyparallel processors " (MPPs). Think of Myrinet as an MPP messagepassing network that can span campus dimensions, rather than as a widea ..."
Abstract

Cited by 1011 (0 self)
 Add to MetaCart
area telecommunications network that is operating in close quarters. The technical steps toward making Myrinet a reality included the development of (1) robust, 25m communication channels with flow control, packet framing, and error control; (2) selfinitializing, lowlatency, cutthrough switches; (3) host interfaces
Theoretical improvements in algorithmic efficiency for network flow problems

, 1972
"... This paper presents new algorithms for the maximum flow problem, the Hitchcock transportation problem, and the general minimumcost flow problem. Upper bounds on ... the numbers of steps in these algorithms are derived, and are shown to compale favorably with upper bounds on the numbers of steps req ..."
Abstract

Cited by 560 (0 self)
 Add to MetaCart
are given. We show that, if each flow augmentation is made along an augmenting path having a minimum number of arcs, then a maximum flow in an nnode network will be obtained after no more than ~(n a n) augmentations; and then we show that if each flow change is chosen to produce a maximum increase
Network information flow
 IEEE TRANS. INFORM. THEORY
, 2000
"... We introduce a new class of problems called network information flow which is inspired by computer network applications. Consider a pointtopoint communication network on which a number of information sources are to be mulitcast to certain sets of destinations. We assume that the information source ..."
Abstract

Cited by 1967 (24 self)
 Add to MetaCart
coding rate region. Our result can be regarded as the Maxflow Mincut Theorem for network information flow. Contrary to one’s intuition, our work reveals that it is in general not optimal to regard the information to be multicast as a “fluid” which can simply be routed or replicated. Rather
Virtual cutthrough: a new computer communication switching technique
 Computer Networks
, 1979
"... In this paper a new switching technique called virtual cutthrough is proposed and its performance is analyzed. This switching system is very similar to message switching, with the difference that when a message arrives in an intermediate node and its selected outgoing channel is free (just after th ..."
Abstract

Cited by 377 (4 self)
 Add to MetaCart
In this paper a new switching technique called virtual cutthrough is proposed and its performance is analyzed. This switching system is very similar to message switching, with the difference that when a message arrives in an intermediate node and its selected outgoing channel is free (just after
Selfadjusting binary search trees
, 1985
"... The splay tree, a selfadjusting form of binary search tree, is developed and analyzed. The binary search tree is a data structure for representing tables and lists so that accessing, inserting, and deleting items is easy. On an nnode splay tree, all the standard search tree operations have an am ..."
Abstract

Cited by 432 (18 self)
 Add to MetaCart
The splay tree, a selfadjusting form of binary search tree, is developed and analyzed. The binary search tree is a data structure for representing tables and lists so that accessing, inserting, and deleting items is easy. On an nnode splay tree, all the standard search tree operations have
An improved approximation algorithm for multiway cut
 Journal of Computer and System Sciences
, 1998
"... Given an undirected graph with edge costs and a subset of k nodes called terminals, a multiway cut is a subset of edges whose removal disconnects each terminal from the rest. Multiway Cut is the problem of finding a multiway cut of minimum cost. Previously, a very simple combinatorial algorithm due ..."
Abstract

Cited by 71 (5 self)
 Add to MetaCart
Given an undirected graph with edge costs and a subset of k nodes called terminals, a multiway cut is a subset of edges whose removal disconnects each terminal from the rest. Multiway Cut is the problem of finding a multiway cut of minimum cost. Previously, a very simple combinatorial algorithm due
Multicommodity maxflow mincut theorems and their use in designing approximation algorithms
 J. ACM
, 1999
"... In this paper, we establish maxflow mincut theorems for several important classes of multicommodity flow problems. In particular, we show that for any nnode multicommodity flow problem with uniform demands, the maxflow for the problem is within an O(log n) factor of the upper bound implied by ..."
Abstract

Cited by 357 (6 self)
 Add to MetaCart
In this paper, we establish maxflow mincut theorems for several important classes of multicommodity flow problems. In particular, we show that for any nnode multicommodity flow problem with uniform demands, the maxflow for the problem is within an O(log n) factor of the upper bound implied
Sybilguard: Defending against sybil attacks via social networks
 In ACM SIGCOMM ’06
, 2006
"... Peertopeer and other decentralized, distributed systems are known to be particularly vulnerable to sybil attacks. In a sybil attack, a malicious user obtains multiple fake identities and pretends to be multiple, distinct nodes in the system. By controlling a large fraction of the nodes in the syst ..."
Abstract

Cited by 331 (6 self)
 Add to MetaCart
an edge between two identities indicates a humanestablished trust relationship. Malicious users can create many identities but few trust relationships. Thus, there is a disproportionatelysmall “cut ” in the graph between the sybil nodes and the honest nodes. SybilGuard exploits this property to bound
Results 1  10
of
1,720