Topology-dependent density optima for efficient simultaneous network exploration
نویسندگان
چکیده
منابع مشابه
Density Estimators for Truncated Dependent Data
In some long term studies, a series of dependent and possibly truncated lifetime data may be observed. Suppose that the lifetimes have a common continuous distribution function F. A popular stochastic measure of the distance between the density function f of the lifetimes and its kernel estimate fn is the integrated square error (ISE). In this paper, we derive a central limit theorem for t...
متن کاملEfficient IP-Level Network Topology Capture
Large-scale distributed traceroute-based measurement systems are used to obtain the topology of the internet at the IP-level and can be used to monitor and understand the behavior of the network. However, existing approaches to measuring the public IPv4 network space often require several days to obtain a full graph, which is too slow to capture much of the network’s dynamics. This paper presen...
متن کاملNetwork Topology Towards Energy-Efficient IP- Networks
Operating the Internet infrastructure in an energy-efficient manner becomes a challenging issue in most recent years with the recognition of significant energy consumption due to its large scale. Yet a limited number of contributions are available to address the issue mainly through putting idle routers and links into sleep mode, at the price of low global resource utilization efficiency and de...
متن کاملEfficient Time-Based Topology-Dependent Scheduling for Radio Packet Networks∗
In Radio Packet Network (RPN), unconstrained transmission may lead to collision of two or more packets. Time Division Multiple Access (TDMA) protocol is a common used protocol to schedule collision-free transmission for such networks. TDMA transmission allows a number of users to access a single radio channel without interference by allocating unique time slots to each user. In TDMA network, ti...
متن کاملEfficient strategies for active interface-level network topology discovery
As a piece of critical infrastructure, the Internet brings both benefits and security concerns. Recent cyber-security episodes such as route hijacks and Denial-of-Service attacks might have been mitigated and prevented with better knowledge of the network’s logical topology; i.e., router nodes and links. Current production public active mapping systems; e.g., Ark, Rocketfuel, and iPlane, produc...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Physical Review E
سال: 2018
ISSN: 2470-0045,2470-0053
DOI: 10.1103/physreve.97.062301