Traffic analysis

Results: 2143



#Item
331Internet protocols / Routing / Internet standards / DNSSEC / Domain Name System Security Extensions / IPv6 / Router / Darknet / Default route / Network architecture / Internet / Computing

Turning  Down  the  Lights:   Darknet  Deployment  Lessons  Learned   Casey  Deccio   DUST1st International Workshop on Darkspace and UnSolicited Traffic Analysis May 14, 2012

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-05-04 18:42:46
332Management / Ethics / Satellite navigation systems / Air traffic control / Project management / Automatic dependent surveillance-broadcast / Risk management / Global Positioning System / Risk / Technology / Avionics / Actuarial science

THE PROPOSED DISCUSSION PAPER and RENEWED COST BENEFIT ANALYSIS of ADS-B COMMENTS by ASAC Dr. R. J. Hall President ASACSUMMARY

Add to Reading List

Source URL: www.asac.asn.au

Language: English - Date: 2015-02-24 20:38:34
333Road transport / Law enforcement / Road safety / Criminal law / Traffic ticket / Warning / Massachusetts Turnpike / Police / Moving violation / Transport / Land transport / Traffic law

July 20, 2003 (updated July 25, 2003) A Boston Globe analysis of traffic tickets and warnings, from every police department in Massachusetts, shows differences in race, sex and age in who gets a fine, and who gets a brea

Add to Reading List

Source URL: www.boston.com

Language: English
334Probability theory / Variance / Bandwidth / Network switch / Normal distribution / Network performance / Statistics / Electronics / Data analysis

1 Variance of Aggregated Web Traffic Robert Morris MIT Laboratory for Computer Science

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 1999-11-19 14:18:01
335Human–computer interaction / Design / Technology / Evaluation methods / Software testing / Web analytics / Human factors / User-centered design / Search analytics / Usability / Human–computer interaction / Technical communication

Using measurements from usability testing, search log analysis and web traffic analysis to inform development of a complex web site used for complex tasks Caroline Jarrett1, Whitney Quesenbery2, Ian Roddis3, Sarah Allen3

Add to Reading List

Source URL: wqusability.com

Language: English - Date: 2009-07-27 06:36:15
336Network architecture / Tor / Traffic analysis / Proxy server / Onion routing / .onion / Internet Relay Chat / Peer-to-peer / Transmission Control Protocol / Internet privacy / Computing / Internet

TOP SECRET//COMINTU//FOUO) Tor 2006 CES Summer Program Abstract (U) Tor is an open-source anonymization program created by Roger Dingledine, Nick Mathewson, and Paul Syverson. Originally sponsored by the US N

Add to Reading List

Source URL: www.queen.clara.net

Language: English - Date: 2013-12-23 19:26:24
337Costs / Electronic toll collection / Pricing / Congestion pricing / Road pricing / Herbert Mohring / Traffic congestion / Electronic Road Pricing / Average cost / Transport / Sustainable transport / Transportation planning

Economic Fundamentals of Road Pricing: A Diagrammatic Analysis by Timothy D. Hau

Add to Reading List

Source URL: www.sef.hku.hk

Language: English - Date: 2003-11-18 17:11:48
338Analytics / Bottleneck / Management / Technology / Business intelligence / INRIX / Business

“…a useful tool for planning and congestion management… The analysis made it clear that using archived traffic operations data is a valuable endeavor.” Delaware Valley Regional Planning Commission (DVRPC – Phil

Add to Reading List

Source URL: www.inrix.com

Language: English - Date: 2015-05-05 03:13:08
339U.S. Consumer Product Safety Commission / Accident / Traffic collision / Safety / Risk / Risk analysis / Ethics / Bethesda /  Maryland

MONASH UNIVERSITY ACCIDENT RESEARCH CENTRE A REVIEW OF PRODUCT RELATED FIRES Joan Ozanne-Smith Wendy Watson

Add to Reading List

Source URL: monash.edu

Language: English - Date: 2011-10-18 23:35:02
340OSI protocols / Domain name system / IP address / IPv6 / Computer network security / Spam filtering / Network architecture / Internet protocols / Computing

A Rendezvous-based Paradigm for Analysis of Solicited and Unsolicited Traffic DUST 2012 May 15, 2012

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-05-04 18:42:46
UPDATE