نتایج جستجو برای: http traffic analysis

تعداد نتایج: 2996689  

2016
MARIANO GALLO GIUSEPPINA DE LUCA

Urban traffic plans (UTPs) are tactical planning tools for managing urban areas and traffic noise abatement is one of their objectives, explicitly provided for under Italian law. To date, the various models and methods for estimating traffic noise have concerned its estimation in a point (or on a road segment). In this paper we propose a method that is able to evaluate the effects of UTPs on no...

2014
Dalibor Pešić Milan Vujanić Krsto Lipovac Boris Antić

To properly define countermeasures to improve traffic safety it is necessary to determine the specific causes and circumstances of accidents. In this sense, the current practice, developed a series of tools for the analysis of accidents that can accurately point to the problem. In-depth analysis of accidents or as they are called independent assessment of traffic accidents is one of the modern ...

2000
Joachim Charzinski

Currently, most traffic in the Internet backbone and access networks is World Wide Web (WWW) traffic. On the basis of recent long-time traffic traces we present characteristics of WWW traffic for different flow levels, namely port-to-port, host-to-host, and total client access. Using flow duration distributions, we obtain estimates for the point in time when a shortcut connection should be esta...

Journal: :Computer Networks 2014
Xiaofei Wu Xin Wang Ke Yu Frank Y. Li

Internet traffic characterization has a profound impact on network engineering and traffic identification. Existing studies are often carried out on a per-flow basis, focusing on the properties of individual flows. In this paper, we study the interaction of Internet traffic flows and network features from a complex network perspective, focusing on six types of applications: P2P file sharing, P2...

Journal: :Transportation Science 2006
Johan van Leeuwaarden

We consider the fixed-cycle traffic-light (FCTL) queue, where vehicles arrive at an intersection controlled by a traffic light and form a queue. The traffic light signal alternates between green and red periods, and delayed vehicles are assumed to depart during the green period at equal time intervals. Most of the research done on the FCTL queue assumes that the vehicles arrive at the intersect...

2004
Florian Mazur Roland Chrobok Sigurdur F. Hafstein Andreas Pottmeier Michael Schreckenberg

Detailed and reliable information about the current traffic state is hardly obtainable by the road user. Therefore, we propose a web based visualization of the current and future traffic load of the autobahn network of North RhineWestphalia, Germany. This novel traffic information system named OLSIM is based on an efficient and highly realistic traffic flow model, which is fed by traffic data f...

Journal: :JoWUA 2012
Byungha Choi Kyungsan Cho

In this paper, we propose a detection scheme to protect the Web server by inspecting HTTP outbound traffic from insider attacks which reveal confidential/private information or spread malware codes through Web. Our proposed scheme has a two-step hierarchy with a signature-based detector using Snort, and an anomaly-based detector using HMM. Through the verification analysis under the attacked We...

2002
Kai Below Ulrich Killat

The simulation of models from real existing networks where measurements of the traffic exist are challenging: One major concern is the establishment of the measured traffic intensities with the simulation model with HTTP/TCP sources. The steady state formulas for the TCP throughput are not applicable for short-time connections that are characteristic for WWW traffic. We have addressed this prob...

2011
Sambuddho Chakravarty Georgios Portokalidis Michalis Polychronakis Angelos D. Keromytis

Anonymous communication networks like Tor partially protect the confidentiality of their users’ traffic by encrypting all intraoverlay communication. However, when the relayed traffic reaches the boundaries of the overlay network towards its actual destination, the original user traffic is inevitably exposed. At this point, unless end-toend encryption is used, sensitive user data can be snooped...

Journal: :Computer Networks 2009
Michael Zink Kyoungwon Suh Yu Gu James F. Kurose

1389-1286/$ see front matter 2008 Elsevier B.V doi:10.1016/j.comnet.2008.09.022 * Corresponding author. Tel.: +1 413 545 4465. E-mail address: [email protected] (M. Zink). 1 http://www.usatoday.com/tech/news/2006-07 x.htm http://en.wikipedia.org/wiki/YouTube. User-Generated Content has become very popular since new web services such as YouTube allow for the distribution of user-produced media c...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید