The Space Requirement of Local Forwarding on Acyclic Networks
暂无分享,去创建一个
[1] Lata Narayanan,et al. Optimal Local Buffer Management for Information Gathering with Adversarial Traffic , 2017, SPAA.
[2] Bruce M. Maggs,et al. Universal packet routing algorithms , 1988, [Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science.
[3] H. T. Kung,et al. Credit-Based Flow Control for ATM Networks , 1994, SIGCOMM 1994.
[4] Nir Shavit,et al. Slide-The Key to Polynomial End-to-End Communication , 1997, J. Algorithms.
[5] Nancy A. Lynch,et al. Distributed computation in dynamic networks , 2010, STOC '10.
[6] Micah Adler,et al. Tight bounds for the performance of Longest In System on DAGs , 2005, J. Algorithms.
[7] Baruch Awerbuch,et al. Improved approximation algorithms for the multi-commodity flow problem and local competitive routing in dynamic networks , 1994, STOC '94.
[8] Boaz Patt-Shamir,et al. Buffer overflow management in QoS switches , 2001, STOC '01.
[9] Adi Ros. A Note on Models for Non-Probabilistic Analysis of Packet-Switching Networks , 2002 .
[10] Allan Borodin,et al. Adversarial queuing theory , 2001, JACM.
[11] Baruch Awerbuch,et al. Universal-stability results and performance bounds for greedy contention-resolution protocols , 2001, JACM.
[12] Rene L. Cruz,et al. A calculus for network delay, Part I: Network elements in isolation , 1991, IEEE Trans. Inf. Theory.
[13] Rafail Ostrovsky,et al. Dynamic routing on networks with fixed-size buffers , 2003, SODA '03.
[14] Rafail Ostrovsky,et al. Log-Space Polynomial End-to-End Communication , 1998, SIAM J. Comput..
[15] Baruch Awerbuch,et al. Reliable broadcast protocols in unreliable networks , 1986, Networks.
[16] Andrew V. Goldberg,et al. Finding Minimum-Cost Circulations by Successive Approximation , 1990, Math. Oper. Res..
[17] Baruch Awerbuch,et al. A simple local-control approximation algorithm for multicommodity flow , 1993, Proceedings of 1993 IEEE 34th Annual Foundations of Computer Science.
[18] Boaz Patt-Shamir,et al. Self-stabilizing end-to-end communication , 1996, J. High Speed Networks.
[19] P. Merlin,et al. Deadlock Avoidance in Store-and-Forward Networks - I: Store-and-Forward Deadlock , 1980, IEEE Transactions on Communications.
[20] Yishay Mansour,et al. Competitive queue policies for differentiated services , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[21] Rafail Ostrovsky,et al. Log-space polynomial end-to-end communication , 1995, STOC '95.
[22] Michael H. Goldwasser. A survey of buffer management policies for packet switches , 2010, SIGA.
[23] Christian Scheideler,et al. Simple routing strategies for adversarial systems , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[24] Boaz Patt-Shamir,et al. Buffer Size for Routing Limited-Rate Adversarial Traffic , 2016, DISC.