Author:
Lad Mohit,Massey Dan,Meyerson Adam,Nanavati Akash,Zhang Lixia
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computational Theory and Mathematics,Control and Optimization,Discrete Mathematics and Combinatorics,Computer Science Applications
Reference12 articles.
1. Griffin T, Wilfong GT (2000) A safe path vector protocol. In: INFOCOM (2):490–499
2. Dahlhause E, Johnson DS, Papadimitriou CH, Seymore PD, Yannakakis, M (1992) The complexity of multiway cuts. In: 24th Annual ACM Symposium on Theory of Computing.
3. Garg N, Vazirani V, Yannakakis M (2004) Multiway cuts in node weighted graphs. In: Journal of Algorithms 49–61
4. Reddy A, Govindan R, Estrin D (2000) Fault isolation in multicast trees. In: SIGCOMM 29–40
5. Bejerano Y, Rastogi R (2003) Robust Monitoring of Link Delays and Faults in IP Networks. In: INFOCOMM