Please use this identifier to cite or link to this item: https://olympias.lib.uoi.gr/jspui/handle/123456789/26662
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKoukopoulos, D.en
dc.contributor.authorNikolopoulos, S.en
dc.contributor.authorPalios, L.en
dc.contributor.authorSpirakis, P.en
dc.date.accessioned2015-12-11T13:23:13Z-
dc.date.available2015-12-11T13:23:13Z-
dc.identifier.urihttps://olympias.lib.uoi.gr/jspui/handle/123456789/26662-
dc.rightsDefault License-
dc.subjectPacket-switched communication networksen
dc.subjectNetwork stabilityen
dc.subjectLinear algorithmsen
dc.subjectGraph theoryen
dc.subjectIntrusion detectionen
dc.subjectAdversarial queueing theoryen
dc.titleOptimal algorithms for detecting network stabilityen
heal.typebookChapter-
heal.type.enBook chapteren
heal.type.elΚεφάλαιο βιβλίουel
heal.generalDescription188-199 σ.el
heal.languageen-
heal.accesscampus-
heal.recordProviderΠανεπιστήμιο Ιωαννίνων. Σχολή Θετικών Επιστημών. Τμήμα Μηχανικών Η/Υ & Πληροφορικήςen
heal.publicationDate2008-
heal.bibliographicCitationΒιβλιογραφία: σ. 198-199el
heal.abstractA packet-switched network is universally stable if, for any greedy protocol and any adversary of injection rate less than 1, the number of packets in the network remains bounded at all times. A natural question that arises is whether there is a fast way to detect if a network is universally stable based on the network’s structure. In this work, we study this question in the context of Adversarial Queueing Theory which assumes that an adversary controls the locations and rates of packet injections and determines packet paths. Within this framework, we present optimal algorithms for detecting the universal stability (packet paths do not contain repeated edges but may contain repeated vertices) and the simple-path universal stability (paths contain neither repeated vertices nor repeated edges) of a network. Additionally, we describe an algorithm which decides in constant time whether the addition of a link in a universally stable network leads it to instability; such an algorithm could be useful in detecting intrusion attacks.en
heal.publisherSpringer Berlin / Heidelbergen
heal.fullTextAvailabilitytrue-
heal.bookName-en
Appears in Collections:Μονογραφίες ( Κλειστές)

Files in This Item:
File Description SizeFormat 
Optimal Algorithms for Detecting Network Stability.pdf317.21 kBAdobe PDFView/Open    Request a copy


This item is licensed under a Creative Commons License Creative Commons