<--- Back to Details
First PageDocument Content
Management / Robust random early detection / Active queue management / Random early detection / Network congestion / Blue / Transmission Control Protocol / Denial-of-service attack / Traffic flow / Network performance / Computing / Data
Management
Robust random early detection
Active queue management
Random early detection
Network congestion
Blue
Transmission Control Protocol
Denial-of-service attack
Traffic flow
Network performance
Computing
Data

Add to Reading List

Source URL: sites.google.com

Download Document from Source Website

Share Document on Facebook

Similar Documents

Network performance / Computing / Network management / Network architecture / Queuing delay / Transmission Control Protocol / Packet loss / Robust random early detection / Traffic flow / Random early detection / Tail drop / Throughput

Flow Rate Management and P2P Control

DocID: 1r9FN - View Document

Network performance / Computing / Network management / Random early detection / Transmission Control Protocol / Robust random early detection / Router / Queueing theory / TCP congestion control / DECbit

Controlo 2002 5th Portuguese Conference on Automatic Control University of Aveiro, Aveiro, September 55- 7, 2002 Switched Systems:

DocID: 1qpRO - View Document

Network performance / Computing / Network architecture / Network management / Transmission Control Protocol / Packet loss / Queuing delay / Robust random early detection / Bandwidth management / Traffic flow / Flow control / Traffic shaping

Flow Rate Management and P2P Control

DocID: 1qfsO - View Document

Network performance / Computing / Network management / Network architecture / TCP congestion control / Transmission Control Protocol / Elephant flow / Bandwidth-delay product / Transport layer / Robust random early detection / Throughput / Additive increase/multiplicative decrease

Adaptive Data Transmission in the Cloud Wenfei Wu ∗ , Yizheng Chen ∗ , Ramakrishnan Durairajan ∗ , Dongchan Kim ∗ , Ashok Anand ∗ ∗

DocID: 1q3S9 - View Document

Computer network security / Security / Cyberwarfare / Finance / Spoofing attack / Spoofing / Spoof / Computer security / Speech synthesis / Biometrics / Robust random early detection / Speech technology

ASVspoof 2015: the First Automatic Speaker Verification Spoofing and Countermeasures Challenge Zhizheng Wu1 Tomi Kinnunen2 Nicholas Evans3 Junichi Yamagishi1

DocID: 1pSMR - View Document