Internet traffic

Results: 1449



#Item
81Network protocols / Internet protocols / Internet Standards / IP multicast / Multicast / Tor / Overlay multicast / Mechanistic target of rapamycin / Traffic analysis / Internet Relay Chat / Reliability / Email

Proceedings on Privacy Enhancing Technologies ; ):22–39 Dong Lin, Micah Sherr, and Boon Thau Loo Scalable and Anonymous Group Communication with MTor Abstract: This paper presents MTor, a low-latency anonymous

Add to Reading List

Source URL: security.cs.georgetown.edu

Language: English - Date: 2016-07-26 12:57:18
82World Wide Web / Web analytics / Humancomputer interaction / Information Age / Web traffic / Jorn Barger / Website / Blog / Web crawler / Jakob Nielsen / Internet / Hypertext

Flocks, Herds, and Stories temporal coherence and the long tail Mark Bernstein Eastgate Systems, Inc. 134 Main Street Watertown MAUSA

Add to Reading List

Source URL: www.websci11.org

Language: English - Date: 2016-03-15 09:54:44
83Spamming / Computer networking / Internet privacy / Network performance / Proxy server / Content-control software / Internet / Phishing

BLOXX WEB FILTER The Bloxx Web Filter is the only available Web content filter that provides genuine real-time content analysis, at the point of request across all content categories for both HTTP and HTTPS traffic.

Add to Reading List

Source URL: www.bloxx.com

Language: English - Date: 2015-08-10 11:15:27
84IPv6 / Internet Protocol / IPv6 deployment

IPv6 at Yahoo IPv6 at Yahoo: growth, disparity Large content network: we see traffic from eyeball networks Two main datasets I watch: ● HTTP logging

Add to Reading List

Source URL: irtf.org

- Date: 2015-10-31 00:02:02
85Computer networking / Network protocols / Network architecture / Internet Standards / Internet protocols / Multiprotocol Label Switching / Border Gateway Protocol / Virtual private network / MPLS VPN / OpenStack / Traffic flow / Virtual Private LAN Service

IXNETWORK ® VIRTUAL EDITION (VE) DATA SHEET VIRTUALIZED NETWORK PERFORMANCE TESTING

Add to Reading List

Source URL: www.ixiacom.com

Language: English - Date: 2016-08-02 01:47:05
86Computer security / Advertising / Spamming / Antivirus software / Internet advertising / Internet bot / Blacklist / Whitelist / Video game bot / Targeted advertising / Geotargeting / DNSWL

Why Whitelist? How Common Approaches to Beating Bot Traffic Fall Short Introduction Within the digital advertising industry, waste caused by non-human traffic is a well-documented problem. One 2014 study

Add to Reading List

Source URL: www.areyouahuman.com

Language: English - Date: 2016-05-17 00:03:13
87

On Traffic Types and Service Classes in the Internet Mansour J. Karam, Fouad A. Tobagi TABLE I S UGGESTED MAPPING OF THE TRAFFIC TYPES TO THE PRIORITY LEVELS IN IEEE 802.1D.

Add to Reading List

Source URL: mmnetworks.stanford.edu

Language: English - Date: 2003-04-24 05:05:18
    88

    Routing Traffic through the Internet Photograph courtesy of the National Cable Television Association and TECH CORPS. Understanding the way packets of information move through

    Add to Reading List

    Source URL: msc2010.org

    - Date: 2008-12-18 09:53:21
      89

      Service Differentiation in the Internet to Support Multimedia Traffic Fouad Tobagi, Wa¨el Noureddine, Benjamin Chen, Athina Markopoulou, Chuck Fraleigh, Mansour Karam, Jose-Miguel Pulido, and Jun-ichi Kimura Department

      Add to Reading List

      Source URL: mmnetworks.stanford.edu

      Language: English - Date: 2003-04-24 05:05:18
        UPDATE