Results 21 to 30 of about 914,936 (268)

Risk estimation and stochastic control of innovation processes

open access: yesCybernetics and Information Technologies, 2014
The innovation introduction, no matter whether a product, technology, a method, etc., is being implemented, is connected with considerable risk of investments loss and highly stochastic behaviour, depending on unpredictable factors.
Sgurev Vassil, Drangajov Stanislav
doaj   +1 more source

On Multilateral Security Monitoring and Analysis With an Abstract Tomogram of Network Flows

open access: yesIEEE Access, 2018
In this paper, we present a novel method for visualizing an abstract tomogram of network flows. Through a tomogram, we offer visual cues for quickly sensing aggregate and temporal networking behaviors of the monitored systems.
Young Yoon, Yongjun Choi
doaj   +1 more source

How inter-state amity and animosity complement migration networks to drive refugee flows: A multi-layer network analysis, 1991-2016.

open access: yesPLoS ONE, 2021
What drives the formation and evolution of the global refugee flow network over time? Refugee flows in particular are widely explained as the result of pursuits for physical security, with recent research adding geopolitical considerations for why states
Justin Schon, Jeffrey C Johnson
doaj   +1 more source

PABO: Mitigating Congestion via Packet Bounce in Data Center Networks [PDF]

open access: yes, 2018
In today's data center, a diverse mix of throughput-sensitive long flows and delay-sensitive short flows are commonly presented in shallow-buffered switches.
Liu, Zhiyong   +5 more
core   +3 more sources

Modelling the Processes of Maximizing Hotel Revenues, Based on Applying the Linear Programming and the Network Flows [PDF]

open access: yesRisk in Contemporary Economy, 2011
This work proposes to solve a problem related to maximizing hotels’ revenues through two methods established in operational research domain. In the first part of the paper, the approach involves formulating the objective function and problem’s ...
Margareta RACOVITA   +2 more
doaj  

Efficient Routing by Detecting Elephant Flows with Deep Learning Method in SDN

open access: yesAdvances in Electrical and Computer Engineering, 2023
Nowadays, the increase in the number of devices using local and global networks has made it very challenging to manage network traffic, especially during epidemics and natural disasters.
AYMAZ, S., CAVDAR, T.
doaj   +1 more source

Network structure and influencing factors of the quality of inbound tourism flows circulation [PDF]

open access: yesZiyuan Kexue
[Objective] The objective of this study was to reveal the structural characteristics of the network of inbound tourism flows circulation quality and the role of various provinces within this network, and to analyze the influencing factors of the quality ...
MA Lijun, LIANG Xiaoyao
doaj   +1 more source

Self-Supervised Latent Representations of Network Flows and Application to Darknet Traffic Classification

open access: yesIEEE Access, 2023
Characterizing network flows is essential for security operators to enhance their awareness about cyber-threats targeting their networks. The automation of network flow characterization with machine learning has received much attention in recent years ...
Mehdi Zakroum   +3 more
doaj   +1 more source

Towards Provably Invisible Network Flow Fingerprints

open access: yes, 2018
Network traffic analysis reveals important information even when messages are encrypted. We consider active traffic analysis via flow fingerprinting by invisibly embedding information into packet timings of flows.
Goeckel, Dennis   +3 more
core   +1 more source

Non-local impact of link failures in linear flow networks

open access: yesNew Journal of Physics, 2019
The failure of a single link can degrade the operation of a supply network up to the point of complete collapse. Yet, the interplay between network topology and locality of the response to such damage is poorly understood.
Julius Strake   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy