<--- Back to Details
First PageDocument Content
Computing / Information / Data / Robust random early detection / Iperf / Deep packet inspection / Network packet / Denial-of-service attack / Sliding window protocol / Computer network security / Network performance / Denial-of-service attacks
Date: 2013-05-17 18:59:37
Computing
Information
Data
Robust random early detection
Iperf
Deep packet inspection
Network packet
Denial-of-service attack
Sliding window protocol
Computer network security
Network performance
Denial-of-service attacks

C:/Users/Gautam/Desktop/JournalRevision/Thatte_JRNL_twoColumn_revision.dvi

Add to Reading List

Source URL: www.isi.edu

Download Document from Source Website

File Size: 419,66 KB

Share Document on Facebook

Similar Documents

Network performance / Computing / Network management / Network architecture / Queuing delay / Transmission Control Protocol / Packet loss / Robust random early detection / Traffic flow / Random early detection / Tail drop / Throughput

Flow Rate Management and P2P Control

DocID: 1r9FN - View Document

Network performance / Computing / Network management / Random early detection / Transmission Control Protocol / Robust random early detection / Router / Queueing theory / TCP congestion control / DECbit

Controlo 2002 5th Portuguese Conference on Automatic Control University of Aveiro, Aveiro, September 55- 7, 2002 Switched Systems:

DocID: 1qpRO - View Document

Network performance / Computing / Network architecture / Network management / Transmission Control Protocol / Packet loss / Queuing delay / Robust random early detection / Bandwidth management / Traffic flow / Flow control / Traffic shaping

Flow Rate Management and P2P Control

DocID: 1qfsO - View Document

Network performance / Computing / Network management / Network architecture / TCP congestion control / Transmission Control Protocol / Elephant flow / Bandwidth-delay product / Transport layer / Robust random early detection / Throughput / Additive increase/multiplicative decrease

Adaptive Data Transmission in the Cloud Wenfei Wu ∗ , Yizheng Chen ∗ , Ramakrishnan Durairajan ∗ , Dongchan Kim ∗ , Ashok Anand ∗ ∗

DocID: 1q3S9 - View Document

Computer network security / Security / Cyberwarfare / Finance / Spoofing attack / Spoofing / Spoof / Computer security / Speech synthesis / Biometrics / Robust random early detection / Speech technology

ASVspoof 2015: the First Automatic Speaker Verification Spoofing and Countermeasures Challenge Zhizheng Wu1 Tomi Kinnunen2 Nicholas Evans3 Junichi Yamagishi1

DocID: 1pSMR - View Document