Network traffic control

Results: 798



#Item
81

Field: Math / Applied Math / Informatics Session Topic: Network Dynamics and Traffic Control: Jamming and Flow Chair: Dimitris ACHLIOPTAS, University of California, Santa Cruz

Add to Reading List

Source URL: www.jsps.go.jp

- Date: 2008-03-13 01:46:23
    82

    Applying Network Policy Control to Asymmetric Traffic: Considerations and Solutions An Industry Whitepaper Contents Executive Summary ................................... 1

    Add to Reading List

    Source URL: www.sandvine.com

    Language: English
      83Electronics / Energy / Streaming media / Transmission Control Protocol / Traffic shaping / Delay-tolerant networking / IEEE 802.11 / ANT / Interplanetary Internet / Computing / Network performance / Concurrent computing

      JOURNAL OF INTERNET ENGINEERING, VOL. 5, NO. 1, JUNEEnergy-efficient internetworking with DTN Dimitris Vardalis1 and Vassilis Tsaoussidis2

      Add to Reading List

      Source URL: www.spice-center.org

      Language: English - Date: 2013-04-17 11:49:06
      84OSI protocols / Transmission Control Protocol / Traffic flow / OpenFlow / Network switch / Tree traversal / Tree / Network topology / Scheduling / Computing / Network architecture / Network protocols

      Maple: Simplifying SDN Programming Using Algorithmic Policies Andreas Voellmy? ? Junchang Wang?†

      Add to Reading List

      Source URL: conferences.sigcomm.org

      Language: English - Date: 2013-07-12 10:32:38
      85SALW / Arms Trade Treaty / Wassenaar Arrangement / Arms industry / International Traffic in Arms Regulations / United Nations Security Council Resolution / Common Foreign and Security Policy / Export / Small Arms Survey / International relations / Arms control / Law

      EU N on -P roliferation C onsortium The European network of independent non-proliferation think tanks D iscussion Paper February 2014

      Add to Reading List

      Source URL: www.nonproliferation.eu

      Language: English - Date: 2014-11-27 12:02:14
      86Network address translation / Computer network security / TCP/IP stack fingerprinting / IPv4 / IP address / Private network / Transmission Control Protocol / Network protocols / Network architecture / Internet / Computing

      2014 IEEE Security and Privacy Workshops Can we identify NAT behavior by analyzing Traffic Flows? YaseminGokcen

      Add to Reading List

      Source URL: ieee-security.org

      Language: English - Date: 2014-04-30 03:11:08
      87Computer security / Denial-of-service attack / Transmission Control Protocol / Traffic flow / Deep packet inspection / Secure Shell / Sliding window protocol / Port knocking / Deep content inspection / Computer network security / Computing / Cyberwarfare

      Flow-based Brute-force Attack Detection Martin Draˇsar, Jan Vykopal Masaryk University Institute of Computer Science Botanick´a 68a, Brno, Czech Republic Philipp Winter

      Add to Reading List

      Source URL: www.cs.kau.se

      Language: English - Date: 2014-05-26 09:37:41
      88Road safety / Operations research / Actuarial science / Risk management / Road traffic control / Traffic flow / Multi-criteria decision analysis / Risk / Simulation / Transport / Land transport / Road transport

      Transport Research Arena 2014, Paris The STARs evaluation tool: optimising network performance, road worker safety and road user safety during roadworks and maintenance Jill Weekleya*, Nora Ni Nuallainb, Renaud Sarrazin

      Add to Reading List

      Source URL: tra2014.traconference.eu

      Language: English - Date: 2015-01-12 09:16:19
      89Routing / Computer networking / Packet switching / Packet forwarding / Routing table / Forwarding plane / Packet Processing / Transmission Control Protocol / Router / Network architecture / Computing / Internet

      Secure and Scalable Fault Localization under Dynamic Traffic Patterns

      Add to Reading List

      Source URL: ieee-security.org

      Language: English - Date: 2012-05-22 01:34:31
      90OSI protocols / Transmission Control Protocol / Bandwidth management / Network congestion / Traffic flow / Network performance / Computing / Network architecture

      In Commercial Deployment A internet traffic end-to-end from any 1 point in TCP path control at bandwidth bottlenecks to

      Add to Reading List

      Source URL: www.jin-magic.com

      Language: English - Date: 2014-02-28 00:43:12
      UPDATE