Ford-Fulkerson Method

Facts The Ford-Fulkerson methodΒ  is iterative This method depends on three ideas: Augmenting paths Residual networks Cuts Simplified Pseudo-code: initialize flow f to 0 while there exist an augmenting path p do augmented flow f along p return f Augmenting Paths An augmenting path is a simple path from source to sing in the residual […]

Share

Notes: Operative Systems – Part 3

< Previous (Operative Systems – Part 2) | (Operative Systems – Part 4) Next > NOTIFICATION: These notes are published for educational purposes. Using these notes is under your own responsibility and risk. These notes are given β€˜as is’. I do not take responsibilities for how you use them. PDF Content: System call operation (syscall) […]

Share

Introduction to Network Security – Part 11

NOTIFICATION: These examples are provided for educational purposes. The use of this code and/or information is under your own responsibility and risk. The information and/or code is given β€˜as is’. I do not take responsibilities of how they are used. You are welcome to point out any mistakes in my posting and/or leave a comment. […]

Share

Introduction to Network Security – Part 9

NOTIFICATION: These examples are provided for educational purposes. The use of this code and/or information is under your own responsibility and risk. The information and/or code is given β€˜as is’. I do not take responsibilities of how they are used. You are welcome to point out any mistakes in my posting and/or leave a comment. […]

Share

Introduction to Network Security – Part 8

NOTIFICATION: These examples are provided for educational purposes. The use of this code and/or information is under your own responsibility and risk. The information and/or code is given β€˜as is’. I do not take responsibilities of how they are used. You are welcome to point out any mistakes in my posting and/or leave a comment. […]

Share