Network traffic control

Results: 798



#Item
61Computing / Computer network security / Cyberwarfare / Data security / Transmission Control Protocol / Packet injection / Sandvine / Firewall / Traffic flow / Internet protocol suite / Idle scan

Detecting Forged TCP Reset Packets Nicholas Weaver ICSI Robin Sommer

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:05
62Network performance / Computer networking / Network congestion / Traffic flow / Packet loss / Transmission Control Protocol / Throughput / Blue / Router / Robust random early detection / Fairness measure / Scheduling

Better Never than Late: Meeting Deadlines in Datacenter Networks Christo Wilson Hitesh Ballani

Add to Reading List

Source URL: current.cs.ucsb.edu

Language: English - Date: 2011-07-07 15:26:28
63Computer networking / Computing / Named data networking / Packet loss / Retransmission / Transmission Control Protocol / Traffic flow / Communications protocol / Computer network / Hop / Queuing delay / Network packet

Active Interest Management for Improving Flow Completion Time in Named-Data Networking Sugi Lee, Yusung Kim Younghoon Kim

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2014-12-01 17:07:38
64Computing / Network architecture / Computer architecture / Ethernet / Routing / Computer networking / Network topology / Load balancing / Network management / Transmission Control Protocol / Network switch / Traffic flow

Expeditus: Distributed Load Balancing with Global Congestion Information in Data Center Networks Peng Wang, Hong Xu Department of Computer Science, City University of Hong Kong ABSTRACT

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2014-12-01 17:06:52
65Spamming / Computing / Computer network security / Multi-agent systems / Botnets / Concurrent computing / Cyberwarfare / Command and control / Storm botnet / Cluster analysis / Internet bot / Hierarchical clustering

BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection Guofei Gu† , Roberto Perdisci‡ , Junjie Zhang† , and Wenke Lee† † College of Computing, Georgia Institut

Add to Reading List

Source URL: faculty.cs.tamu.edu

Language: English - Date: 2008-05-09 14:43:43
66Avionics / Computer network security / Computing / Security / Cyberwarfare / Air traffic control / Automatic dependent surveillance  broadcast / Intrusion detection system / Traffic collision avoidance system / Secondary surveillance radar / ADS / Computer security

Intrusion Detection for Airborne Communication using PHY-Layer Information Martin Strohmeier1 , Vincent Lenders2 , Ivan Martinovic1 1

Add to Reading List

Source URL: www.lenders.ch

Language: English - Date: 2015-08-08 10:32:39
67Computer network security / Multipath TCP / Transmission Control Protocol / Cyberwarfare / Network address translation / Network performance / Transport layer / Firewall / TCP offload engine / TCP reset attack

A first look at real Multipath TCP traffic B. Hesmans, H. Tran-Viet, R. Sadre, O. Bonaventure ICTEAM, Universit´e catholique de Louvain, Louvain-la-Neuve, Belgium Abstract. Multipath TCP is a new TCP extension that attr

Add to Reading List

Source URL: inl.info.ucl.ac.be

Language: English - Date: 2016-03-04 17:10:41
68Transport / Road transport / Network performance / Transportation engineering / Road traffic management / Fundamental diagram of traffic flow / Control theory / Flow control / Reservoir / Throughput / Traffic congestion

Perimeter flow control in heterogeneous networks

Add to Reading List

Source URL: www.strc.ch

Language: English - Date: 2013-04-16 06:43:59
69

IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, VOL. 8, NO. 1, JANUARYAn Intelligent Contraflow Control Method for Real-Time Optimal Traffic Scheduling Using Artificial Neural Network, Fuzzy Pattern Recogniti

Add to Reading List

Source URL: nacto.org

Language: English - Date: 2015-07-13 13:21:16
    70Network performance / Computer networking / Fair queuing / Scheduling algorithms / Streaming / Scheduling / Network scheduler / Transmission Control Protocol / Traffic flow / Deficit round robin / Communications protocol / Robust random early detection

    This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. IEEE/ACM TRANSACTIONS ON NETWORKING 1 QFQ: Efficient Packet Scheduling

    Add to Reading List

    Source URL: info.iet.unipi.it

    Language: English - Date: 2012-10-17 17:46:17
    UPDATE