Internet traffic

Results: 1449



#Item
371Throughput / Two-sided market / CP System / Economic equilibrium / Traffic congestion / Technology / Business / Economics / Pricing / Road transport / Network performance

Subsidization Competition: Vitalizing the Neutral Internet Richard T. B. Ma School of Computing National University of Singapore

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-02-02 18:46:15
372Network performance / Computer networking / Internet privacy / Videotelephony / Computer network security / Proxy server / Gateway / Client–server model / Bandwidth management / Computing / Network architecture / Internet

Policy.Net: Policy Based Network Traffic Management Copyright © , NetVeda LLC. All rights reserved. OVERVIEW Network access is an integral and often critical

Add to Reading List

Source URL: www.netveda.com

Language: English - Date: 2011-01-21 15:58:57
373Web analytics / Spamming / Computing / World Wide Web / Link farm / Web directory / Web traffic / Internet / Search engine optimization / Internet marketing

What is Link Market? by: SEO Content Lab In today’s online world of cut-throat competition, it is important that your website ranks well in search engines. Search engines lists websites on search engine result pages af

Add to Reading List

Source URL: www.linkmarket.net

Language: English - Date: 2011-03-21 14:24:12
374Information technology management / Netflow / IP Flow Information Export / Internet protocol suite / Cisco Systems / Traffic flow / Smart grid / Router / Cisco IOS / Computing / System software / Network management

IP Based Smart Services IP Based Smart Services: Combining Big Data and Networking to Create Innovative New

Add to Reading List

Source URL: www.cse.wustl.edu

Language: English - Date: 2013-12-20 19:02:14
375Routing protocols / Routing / Border Gateway Protocol / Resource Public Key Infrastructure / Email spam / Router / Anycast / Spam / Multihoming / Internet / Network architecture / Computing

SPAMTRACER:   HOW  STEALTHY  ARE  SPAMMERS?   TRAFFIC  MONITORING  AND  ANALYSIS  (TMA)  2013   PIERRE-­‐ANTOINE  VERVIER,  OLIVIER  THONNARD    

Add to Reading List

Source URL: infocom.di.unimi.it

Language: English - Date: 2013-04-29 06:33:08
376Fault-tolerant computer systems / K-means clustering / Cluster analysis / Deep packet inspection / Computer cluster / Statistical classification / Traffic classification / Statistics / Computing / Machine learning

SELF-LEARNING CLASSIFIER FOR INTERNET TRAFFIC LUIGI GRIMAUDO*, MARCO MELLIA*, ELENA BARALIS* AND RAM KERALAPURA⌃ *Politecnico di Torino

Add to Reading List

Source URL: infocom.di.unimi.it

Language: English - Date: 2013-04-23 09:42:45
377Internet standards / Tunneling protocols / Internet protocols / Differentiated services / Traffic congestion / Transmission Control Protocol / Incentive / IPsec / Network architecture / Internet / Computing

Microsoft PowerPoint - refb_sigcomm05_briscoetmp.ppt

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2005-08-26 17:46:40
378Internet / Tor / Onion routing / Anonymous remailer / Proxy server / Traffic analysis / Mixminion / Anonymity / ANts P2P / Internet privacy / Computing / Software

Seeking Anonymity in an Internet Panopticon Joan Feigenbaum and Bryan Ford Yale University 1.

Add to Reading List

Source URL: bford.info

Language: English - Date: 2015-01-03 20:19:38
379Data / User Datagram Protocol / Transmission Control Protocol / Transport layer / Network congestion / Traffic flow / Port / UDP Lite / UDP hole punching / Internet protocols / Computing / Network architecture

Unmasking the Growing UDP Traffic in a Campus Network Changhyun Lee, DK Lee, and Sue Moon Department of Computer Science, KAIST, South Korea Abstract. Transmission control protocol (TCP) has been the dominating protocol

Add to Reading List

Source URL: an.kaist.ac.kr

Language: English - Date: 2012-03-19 08:45:11
380Computer security / Computing / Denial-of-service attack / Internet Relay Chat / Data security / IP address spoofing / Transmission Control Protocol / Traffic flow / SYN flood / Computer network security / Denial-of-service attacks / Cyberwarfare

Inferring Internet Denial-of-Service Activity David Moore CAIDA San Diego Supercomputer Center University of California, San Diego

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-01-24 07:43:10
UPDATE