Results 11 to 20 of about 32,525 (264)
A Complete Review on the Application of Statistical Methods for Evaluating Internet Traffic Usage
Internet traffic classification aims to identify the kind of Internet traffic. With the rise of traffic encryption and multi-layer data encapsulation, some classic classification methods have lost their strength.
Vanice Canuto Cunha +4 more
doaj +1 more source
Internet Traffic Engineering [PDF]
Traffic engineering encompasses a set of techniques that can be used to control the flow of traffic in data networks. We discuss several of those techniques that have been developed during the last few years. Some techniques are focused on pure IP networks while others have been designed with emerging technologies for scalable Quality of Service (QoS ...
Bonaventure, Olivier +13 more
openaire +3 more sources
Internet traffic classification is a beneficial technique in the direction of intrusion detection and network monitoring. After several years of searching, there are still many open problems in Internet traffic classification.
Hamza Awad Hamza Ibrahim +3 more
doaj +1 more source
Site-to-site internet traffic control [PDF]
Queues allow network operators to control traffic: where queues build, they can enforce scheduling and shaping policies. In the Internet today, however, there is a mismatch between where queues build and where control is most effectively enforced; queues build at bottleneck links that are often not under the control of the data sender.
Cangialosi, Frank +5 more
openaire +2 more sources
This paper presents a novel variable speed limit control system under the vehicle to infrastructure environment to optimize the freeway traffic mobility and safety. The control system is a multiagent system consists of several traffic control agents. The
Chong Wang +4 more
doaj +1 more source
Towards Forward Secure Internet Traffic [PDF]
Forward Secrecy (FS) is a security property in key-exchange algorithms which guarantees that a compromise in the secrecy of a long-term private-key does not compromise the secrecy of past session keys. With a growing awareness of long-term mass surveillance programs by governments and others, FS has become widely regarded as a highly desirable property.
Alashwali, E, Szalachowski, P, Martin, A
openaire +3 more sources
BANDWIDTH MODELING ON SMART CAMPUS BASED ON ENGINEERING METHOD – STATISTICS
The importance of generating internet traffic as one of the basic considerations in bandwidth allocation policies between faculties is increasing due to the number of students who complain about connection services on campus. This study proposes internet
Ewi Ismaredah, Hasdi Radiles
doaj +1 more source
LFIR-YOLO: Lightweight Model for Infrared Vehicle and Pedestrian Detection
The complexity of urban road scenes at night and the inadequacy of visible light imaging in such conditions pose significant challenges. To address the issues of insufficient color information, texture detail, and low spatial resolution in infrared ...
Quan Wang +4 more
doaj +1 more source
Telecommunication traffic: global disparities and international flows
New information and communication technologies (ICTs) have shrunk geographical space and time more than ever. But do people fully use the opportunities provided by the newest ICTs?
Nagirnaya Anastasia
doaj +1 more source
Multicast Load-Balanced Birkhoff-Von Neumann Switch With Greedy Scheduling
Internet traffic is still exhibiting an exponential growth. This exponential growth will certainly be continued given the Internet of Things (IoT) and Internet of Everything (IoE) predictions regarding the number of devices connected to the Internet in ...
Srdjan Durkovic, Zoran Cica
doaj +1 more source

