نتایج جستجو برای: network traffic identification

تعداد نتایج: 1117736  

By pervasiveness of cloud computing, a colossal amount of applications from gigantic organizations increasingly tend to rely on cloud services. These demands caused a great number of applications in form of couple of virtual machines (VMs) requests to be executed on data centers’ servers. Some of applications are as big as not possible to be processed upon a single VM. Also, there exists severa...

2015
Purna Chandra Sethi Prafulla Kumar Behera Luigi Grimaudo Marco Mellia Elena Baralis Ram Keralapura Tzu-Fang Sheu Nen-Fu Huang Hsiao-Ping Lee

Due to the growth in prominence of Web, there is a need for proficient system administration. Network visibility becomes very crucial for traffic engineering and network management. A large number of users demands varied information at a given time. By identifying the users that demand same type of information and clustering them into different groups, the Internet accessibility and resource ut...

2013
LIU SHAO WU JIN - ZHAO

It is a major scientific theoretical significance and practical value that the identification of the hub node in the transport network. This paper presents a new method which can detect the hub node of the urban transportation based on the idea of local modularity measure. Evaluation indicators include node degree, clustering coefficient, peak hour traffic flow. First, apply a complex network o...

Journal: :international journal of information, security and systems management 2013
azadeh pirhayati mohammad nassiri

ieee 802.11e standard is proposed to support quality of service (qos) in wireless local area networks (wlans). the distributed access method of 802.11e, enhanced distributed channel access (edca), prioritizes traffic generated by delay-sensitive applications by increasing probability to access medium for this type of traffic. edca resets the contention window (cw) of mobile stations to a minimu...

2012
Jordi Casas

In the world of transport management, the term ‘anticipation’ is gradually replacing ‘reaction’. Indeed, the ability to forecast traffic evolution in a network should ideally form the basis for many traffic management strategies and multiple ITS applications. Real-time prediction capabilities are therefore becoming a concrete need for the management of networks, both for urban and interurban en...

2006
Jean-Pierre van Riel Barry Irwin

Detecting and investigating intrusive Internet activity is an ever-present challenge for network administrators and security researchers. Network monitoring can generate large, unmanageable amounts of log data, which further complicates distinguishing between illegitimate and legitimate traffic. Considering the above issue, this article has two aims. First, it describes an investigative methodo...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید