17,958 research outputs found
EventFlow: Network Flow Aggregation Based on User Actions
Network flow monitoring is being supplemented with an application flow visibility to provide more detailed information about network traffic. However, the current concept of flows does not provide a mechanism to keep track of semantic relations between individual flows that are created as a part of a single user action. We propose an extension to the flow measurement, called EventFlow, which allows to preserve relations between HTTP and DNS application flows that are a part of single user action, most typically browsing a web page. We describe an architecture of the EventFlow extension and its limitations. A prototype implementation of the EventFlow is introduced and evaluated on a packet trace from an ISP network. We show that a significant number of flow records can be recognised as a part of a single user action
Network Flow Algorithms for Structured Sparsity
We consider a class of learning problems that involve a structured
sparsity-inducing norm defined as the sum of -norms over groups of
variables. Whereas a lot of effort has been put in developing fast optimization
methods when the groups are disjoint or embedded in a specific hierarchical
structure, we address here the case of general overlapping groups. To this end,
we show that the corresponding optimization problem is related to network flow
optimization. More precisely, the proximal problem associated with the norm we
consider is dual to a quadratic min-cost flow problem. We propose an efficient
procedure which computes its solution exactly in polynomial time. Our algorithm
scales up to millions of variables, and opens up a whole new range of
applications for structured sparse models. We present several experiments on
image and video data, demonstrating the applicability and scalability of our
approach for various problems.Comment: accepted for publication in Adv. Neural Information Processing
Systems, 201
Towards Provably Invisible Network Flow Fingerprints
Network traffic analysis reveals important information even when messages are
encrypted. We consider active traffic analysis via flow fingerprinting by
invisibly embedding information into packet timings of flows. In particular,
assume Alice wishes to embed fingerprints into flows of a set of network input
links, whose packet timings are modeled by Poisson processes, without being
detected by a watchful adversary Willie. Bob, who receives the set of
fingerprinted flows after they pass through the network modeled as a collection
of independent and parallel queues, wishes to extract Alice's embedded
fingerprints to infer the connection between input and output links of the
network. We consider two scenarios: 1) Alice embeds fingerprints in all of the
flows; 2) Alice embeds fingerprints in each flow independently with probability
. Assuming that the flow rates are equal, we calculate the maximum number of
flows in which Alice can invisibly embed fingerprints while having those
fingerprints successfully decoded by Bob. Then, we extend the construction and
analysis to the case where flow rates are distinct, and discuss the extension
of the network model
Network Flow Optimization for Restoration of Images
The network flow optimization approach is offered for restoration of
grayscale and color images corrupted by noise. The Ising models are used as a
statistical background of the proposed method. The new multiresolution network
flow minimum cut algorithm, which is especially efficient in identification of
the maximum a posteriori estimates of corrupted images, is presented. The
algorithm is able to compute the MAP estimates of large size images and can be
used in a concurrent mode. We also describe the efficient solutions of the
problem of integer minimization of two energy functions for the Ising models of
gray-scale and color images
Linear-Time FPT Algorithms via Network Flow
In the area of parameterized complexity, to cope with NP-Hard problems, we
introduce a parameter k besides the input size n, and we aim to design
algorithms (called FPT algorithms) that run in O(f(k)n^d) time for some
function f(k) and constant d. Though FPT algorithms have been successfully
designed for many problems, typically they are not sufficiently fast because of
huge f(k) and d. In this paper, we give FPT algorithms with small f(k) and d
for many important problems including Odd Cycle Transversal and Almost 2-SAT.
More specifically, we can choose f(k) as a single exponential (4^k) and d as
one, that is, linear in the input size. To the best of our knowledge, our
algorithms achieve linear time complexity for the first time for these
problems. To obtain our algorithms for these problems, we consider a large
class of integer programs, called BIP2. Then we show that, in linear time, we
can reduce BIP2 to Vertex Cover Above LP preserving the parameter k, and we can
compute an optimal LP solution for Vertex Cover Above LP using network flow.
Then, we perform an exhaustive search by fixing half-integral values in the
optimal LP solution for Vertex Cover Above LP. A bottleneck here is that we
need to recompute an LP optimal solution after branching. To address this
issue, we exploit network flow to update the optimal LP solution in linear
time.Comment: 20 page
Deep Network Flow for Multi-Object Tracking
Data association problems are an important component of many computer vision
applications, with multi-object tracking being one of the most prominent
examples. A typical approach to data association involves finding a graph
matching or network flow that minimizes a sum of pairwise association costs,
which are often either hand-crafted or learned as linear functions of fixed
features. In this work, we demonstrate that it is possible to learn features
for network-flow-based data association via backpropagation, by expressing the
optimum of a smoothed network flow problem as a differentiable function of the
pairwise association costs. We apply this approach to multi-object tracking
with a network flow formulation. Our experiments demonstrate that we are able
to successfully learn all cost functions for the association problem in an
end-to-end fashion, which outperform hand-crafted costs in all settings. The
integration and combination of various sources of inputs becomes easy and the
cost functions can be learned entirely from data, alleviating tedious
hand-designing of costs.Comment: Accepted to CVPR 201
- …