Controlled Use of Excess Backbone Bandwidth for Providing New Services in IP-Over-WDM Networks
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
The ever-growing amount of data available on the Internet calls for personalization. Yet, the most effective personalization schemes, such as those based on collaborative filtering (CF), are notoriously resource greedy. This paper presents HyRec, an online ...
Nous assistons à la concomitance de la mondialisation de la politique et de la nationalisation d’Internet. La politique est en effet une œuvre magistrale, subtile et délicate par laquelle un monde devient commun. Elle organise la coexistence afin de rendre ...
Reliable packet delivery within stringent time limits is a key requirement of smart-grid and other industrial communication networks. The Parallel Redundancy Protocol (PRP), used in this context, duplicates packets at the MAC layer over parallel networks a ...
Un espace de stockage et de conservation des contenus nativement digitaux. A Place of Storage and Preservation of nativly digital Contents. Text: m.ark is information; m.ark is immaterial; m.ark is hardware m.ark is storage; m.ark is material; m.ark is con ...
A close look at many existing systems reveals their two- or multi-layer nature, where a number of coexisting networks interact and depend on each other. For instance, in the Internet, any application-level graph (such as a peer-to-peer network) is mapped o ...
Having multiple network interfaces or gateways available, the Internet users can transfer their data through multiple paths to achieve load balancing, fault-tolerance, and more aggregate bandwidth. However, transferring the packets of the same flow over mu ...
In a bandwidth-flooding attack, compromised sources send high-volume traffic to the target with the purpose of causing congestion in its tail circuit and disrupting its legitimate communications. In this paper, we present Active Internet Traffic Filtering ...
The objective of this study was to evaluate the possibility of photoinduced stack/rod electron transfer in surface “zipper” architectures composed of stacks of blue (B) naphthalenediimides (NDIs) along strings of oligophenylethynyl (OPE) rods. The synthesi ...
Circuit-switched backbone networks are appealing especially due to their low switching cost. However, some of their links may be poorly utilised with respect to the available capacity. Grooming can be used to improve this utilisation: optically switched li ...
Ieee Service Center, 445 Hoes Lane, Po Box 1331, Piscataway, Nj 08855-1331 Usa2011
Internet incarne parfaitement la mondialisation. Puissante technique spatiale, Internet oeuvre en effet à rendre la distance non pertinente à l’échelle du Monde. Cette capacité de synchorisation sur de vastes étendues questionne les échelles intermédiaires ...