Distributed Core Multicast (DCM): a multicast routing protocol for many groups with few receivers
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
We investigate Farley’s CAT(0) cubical model for Thompson’s group F (we adopt the classical language of F, using binary trees and piecewise linear maps, avoiding the one of diagram groups and pictures). Main results include: in general, Thompson’s group el ...
In the current Internet, there is no clean way for affected parties to react to poor forwarding performance: to detect and assess Service Level Agreement (SLA) violations by a contractual partner, a domain must resort to ad-hoc monitoring using probes. Ins ...
Brain connectivity can be represented by a network that enables the comparison of the different patterns of structural and functional connectivity among individuals. In the literature, two levels of statistical analysis have been considered in comparing br ...
The integrated approach for the design of solid catalysts for process intensification is presented addressing simultaneously different levels of scale and complexity involved in the development starting from the molecular/nano-scale of the active phase opt ...
How can we protect the network infrastructure from malicious traffic, such as scanning, malicious code propagation, and distributed denial-of-service (DDoS) attacks? One mechanism for blocking malicious traffic is filtering: access control lists (ACLs) can ...
In the current Internet, there is no clean way for affected parties to react to poor forwarding performance: to detect and assess Service Level Agreement (SLA) violations by a contractual partner, a domain must resort to ad-hoc monitoring using probes. Ins ...
Given a principal bundle G hooked right arrow P -> B (each being compact, connected and oriented) and a G-invariant metric h(P) on P which induces a volume form mu(P), we consider the group of all unimodular automorphisms SAut(P, mu(P)) := {phi is an eleme ...
Although research and development (R&D) networks influence the innovation performance of their members, firms may not be fully aware of the scope of their network. In particular, due to cost reasons, they may not be fully informed of their “indirect ties”, ...
The capacity of a wireless lattice network with local interference is studied. In particular, the transport capacity under a multiple unicast traffic pattern is studied for a network of nodes placed on a hexagonal lattice. Different ways of handling broadc ...
We report the experimental demonstration of all-optical
wavelength multicasting of OC-768 (40 Gbps) channel using
a single-pass, pump modulated parametric amplifier. The performances
of 1-to-20 and 1-to-40 multicasting with excellent signal fidelity
we ...
Institute of Electrical and Electronics Engineers2009