標題: Titlebook: Computer Networks; 23rd International C Piotr Gaj,Andrzej Kwiecień,Piotr Stera Conference proceedings 2016 Springer International Publishin [打印本頁] 作者: STH 時間: 2025-3-21 17:31
書目名稱Computer Networks影響因子(影響力)
書目名稱Computer Networks影響因子(影響力)學科排名
書目名稱Computer Networks網絡公開度
書目名稱Computer Networks網絡公開度學科排名
書目名稱Computer Networks被引頻次
書目名稱Computer Networks被引頻次學科排名
書目名稱Computer Networks年度引用
書目名稱Computer Networks年度引用學科排名
書目名稱Computer Networks讀者反饋
書目名稱Computer Networks讀者反饋學科排名
作者: aesthetic 時間: 2025-3-21 21:08 作者: 劇本 時間: 2025-3-22 02:51
Monitoring and Analysis of Measured and Modeled Traffic of TCP/IP Networksm was described. The interface of the software system, and the algorithm of its work were presented. Topology of TCP/IP network in ACS department was shown. Developed software that outputs the results in graphical and tabular forms was represented. The relationship between real and simulated traffic作者: pellagra 時間: 2025-3-22 05:05
Investigating Long-Range Dependence in E-Commerce Web Traffice intensity of LRD via the Hurst parameter are presented. Using a set of traces of a popular e-commerce site, the presence and the nature of LRD in Web traffic is examined. Our results confirm the self-similar nature of traffic at a Web server input, however the resulting estimates of the Hurst para作者: 注射器 時間: 2025-3-22 09:13 作者: 鞭打 時間: 2025-3-22 13:01
Classification of Solutions to the Minimum Energy Problem in One Dimensional Sensor Networksf the distance between transmitter and receiver with any real exponent. We show, how these solutions can be utilized to solve the minimum energy problem for the data transmission cost matrix which is a linear combination of two power functions. We define the minimum energy problem in terms of the se作者: 鞭打 時間: 2025-3-22 19:38 作者: institute 時間: 2025-3-22 22:26 作者: Irremediable 時間: 2025-3-23 04:01
Measuring Client-Server Anonymityrs. We present an accurate method for evaluating the amount of anonymity still available to such clients in the aftermath of an attack. Our method is based upon probabilities arrived at by the attack of possible client-server association levels for being the real one, along with the correctness leve作者: 草率女 時間: 2025-3-23 06:25 作者: Bucket 時間: 2025-3-23 11:55
High-Interaction Linux Honeypot Architecture in Recent Perspective attacks for further analysis. Unfortunately, this field is not covered by recent publications. The paper analyses existing approaches and available open source solutions that can be used to form high-interaction honeypots first. Then the most prospective approach is chosen and best applicable tools作者: STING 時間: 2025-3-23 15:30 作者: 遺忘 時間: 2025-3-23 20:03 作者: forebear 時間: 2025-3-24 00:32 作者: Accomplish 時間: 2025-3-24 05:40
Event-Driven Approach to Modeling and Performance Estimation of a Distributed Control Systemion. Simulation of the system operation in different conditions, performed during early development stages, allows to estimate performance and predict behavior of final implementation. In this paper new event-driven model of a DCS has been introduced and compared with the previous one. Structure of 作者: 痛苦一生 時間: 2025-3-24 07:43 作者: HOWL 時間: 2025-3-24 13:21
Expanding the Ns-2 Emulation Environment with the Use of Flexible Mappingrks in emulation mode. Our enhancements expand the build-in 1-to-1 MAC address mapping to 1-to-many address/port mapping, which allows the emulator to connect to more end-systems or subnetworks than the number of interfaces of the emulation server.作者: Hangar 時間: 2025-3-24 15:46 作者: Scleroderma 時間: 2025-3-24 19:20
Measuring Client-Server Anonymityls of those associations. We demonstrate how additionally taking correctness levels into account results in more accurate anonymity measurement than the customary approach of just computing the Shannon entropy of the probabilities.作者: forecast 時間: 2025-3-24 23:13
Algorithms for Transmission Failure Detection in a Communication System with Two Busesf exchanges, it is necessary to solve the problem of a failure occurrence so that to maintain the transmission continuity. The paper presents the methods of failure detection and algorithms used when such failure occurs.作者: landfill 時間: 2025-3-25 03:50 作者: 大火 時間: 2025-3-25 08:36
1865-0929 72 submissions. They are organized in topical sections on computer networks architectures and protocols, teleinformatics and telecommunications, new technologies, queueing theory, and innovative applications. ?.978-3-319-39206-6978-3-319-39207-3Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: 填滿 時間: 2025-3-25 14:45
Physical Application: The Casimir Effect,rks in emulation mode. Our enhancements expand the build-in 1-to-1 MAC address mapping to 1-to-many address/port mapping, which allows the emulator to connect to more end-systems or subnetworks than the number of interfaces of the emulation server.作者: 團結 時間: 2025-3-25 15:56 作者: 向前變橢圓 時間: 2025-3-25 22:07 作者: 外來 時間: 2025-3-26 02:07
https://doi.org/10.1057/9780230509412f exchanges, it is necessary to solve the problem of a failure occurrence so that to maintain the transmission continuity. The paper presents the methods of failure detection and algorithms used when such failure occurs.作者: Supplement 時間: 2025-3-26 07:27 作者: 金盤是高原 時間: 2025-3-26 09:48
Lecture Notes in Physics Monographs by the sensors in the physical layer, when the transmitter adjust the power of its radio signal to the distance to the receiver, the optimal transmission is without interference. We also show, that the solutions of the minimum energy problem written in terms of data transmission cost matrix and in terms of the sensor signal power coincide.作者: PHON 時間: 2025-3-26 14:40
The British Model of Political Economy,ralized self-organizing system that controls the traffic signals at multiple intersections in an urban road network. Experimental results show that the proposed method is useful for mitigating the negative impact of malicious data on the performance of traffic signal control.作者: Classify 時間: 2025-3-26 19:34 作者: 事情 時間: 2025-3-26 23:32 作者: 食物 時間: 2025-3-27 02:33
https://doi.org/10.1057/9780230509412m and duration of failure detection on communication buses were presented. The authors tried to clarify whether a?failure detection in two buses transmission can have an influence on the delays of transmission. The paper consists of description of a test bench for time parameters measurements, the test results and conclusion.作者: 額外的事 時間: 2025-3-27 06:07 作者: cleaver 時間: 2025-3-27 12:25
Real-Time Traffic over the Cognitive Packet Networkgoals that match the needs of real-time packet delivery in the presence of other background traffic under varied traffic conditions. The resulting design is evaluated via measurements of packet delay, delay variation (jitter) and packet loss ratio.作者: 采納 時間: 2025-3-27 14:33
Classification of Solutions to the Minimum Energy Problem in One Dimensional Sensor Networks by the sensors in the physical layer, when the transmitter adjust the power of its radio signal to the distance to the receiver, the optimal transmission is without interference. We also show, that the solutions of the minimum energy problem written in terms of data transmission cost matrix and in terms of the sensor signal power coincide.作者: 草率男 時間: 2025-3-27 20:03
Detection of Malicious Data in Vehicular Ad Hoc Networks for Traffic Signal Control Applicationsralized self-organizing system that controls the traffic signals at multiple intersections in an urban road network. Experimental results show that the proposed method is useful for mitigating the negative impact of malicious data on the performance of traffic signal control.作者: 燒瓶 時間: 2025-3-28 00:59 作者: 思想 時間: 2025-3-28 05:48 作者: 群島 時間: 2025-3-28 08:46 作者: 文件夾 時間: 2025-3-28 11:10
QoE-Oriented Fairness Control for DASH Systems Based on the Hierarchical Structure of SVC Streamshich uses a?new utility function. This function based on a hierarchical structure of a SVC video stream. The properties of this solution were evaluated in a test environment that uses SDN principles. Functional features of the proposed control method were compared with standard algorithm of the adaptation used by DASH supported devices.作者: CAMEO 時間: 2025-3-28 16:58 作者: 維持 時間: 2025-3-28 20:27
Lecture Notes in Physics Monographsb traffic is examined. Our results confirm the self-similar nature of traffic at a Web server input, however the resulting estimates of the Hurst parameter vary depending on the trace and the technique used.作者: 馬具 時間: 2025-3-29 01:49 作者: 心胸開闊 時間: 2025-3-29 05:01 作者: dialect 時間: 2025-3-29 09:35
The Archetype that Waits: , and ,pen source solutions that can be used to form high-interaction honeypots first. Then the most prospective approach is chosen and best applicable tools are composed. The setup is tested eventually and its usefulness is proven.作者: Nonconformist 時間: 2025-3-29 11:31
https://doi.org/10.1057/9780230509412 behavior of final implementation. In this paper new event-driven model of a DCS has been introduced and compared with the previous one. Structure of the model decreased simulation time and improved scalability of the approach, whereas precision of the results was not diminished.作者: Regurgitation 時間: 2025-3-29 18:50
Investigating Long-Range Dependence in E-Commerce Web Trafficb traffic is examined. Our results confirm the self-similar nature of traffic at a Web server input, however the resulting estimates of the Hurst parameter vary depending on the trace and the technique used.作者: Evolve 時間: 2025-3-29 23:31 作者: 冰雹 時間: 2025-3-30 02:11
Anti-evasion Technique for the Botnets Detection Based on the Passive DNS Monitoring and Active DNS of IP mapping, “domain flux”, “fast flux”, DNS-tunneling. BotGRABBER system is based on a cluster analysis of the features obtained from the payload of DNS-messages and uses active probing analysis. Usage of the developed method makes it possible to detect infected hosts by bots of the botnets with high efficiency.作者: 象形文字 時間: 2025-3-30 04:08 作者: Crater 時間: 2025-3-30 08:47
Event-Driven Approach to Modeling and Performance Estimation of a Distributed Control System behavior of final implementation. In this paper new event-driven model of a DCS has been introduced and compared with the previous one. Structure of the model decreased simulation time and improved scalability of the approach, whereas precision of the results was not diminished.作者: Tortuous 時間: 2025-3-30 13:02
https://doi.org/10.1007/978-3-319-39207-3computer crime; computer networks; distributed computing; Internet; network algorithms; network algorithm作者: 易于 時間: 2025-3-30 19:01
978-3-319-39206-6Springer International Publishing Switzerland 2016作者: Tracheotomy 時間: 2025-3-31 00:06
https://doi.org/10.1007/978-3-540-44757-3 popularisation of the Internet. Real-Time applications have strict Quality of Service (QoS) constraint, which poses a major challenge to IP networks. The Cognitive Packet Network (CPN) has been designed as a QoS-driven protocol that addresses user-oriented QoS demands by adaptively routing packets 作者: 創(chuàng)新 時間: 2025-3-31 02:29 作者: Goblet-Cells 時間: 2025-3-31 07:28
https://doi.org/10.1007/978-3-540-44757-3m was described. The interface of the software system, and the algorithm of its work were presented. Topology of TCP/IP network in ACS department was shown. Developed software that outputs the results in graphical and tabular forms was represented. The relationship between real and simulated traffic作者: Lipoprotein(A) 時間: 2025-3-31 09:30 作者: 昏睡中 時間: 2025-3-31 15:19
https://doi.org/10.1007/978-3-540-44757-3 fairness score function ensures that no node is left without resources while on average everything looks good. It is compared with well-known and widely adopted function proposed by Jain, Chiu and Hawe and another one recently proposed fairness function by Chen and Zhang. The function proposed in t作者: forestry 時間: 2025-3-31 18:59
Lecture Notes in Physics Monographsf the distance between transmitter and receiver with any real exponent. We show, how these solutions can be utilized to solve the minimum energy problem for the data transmission cost matrix which is a linear combination of two power functions. We define the minimum energy problem in terms of the se作者: florid 時間: 2025-4-1 00:10 作者: 出沒 時間: 2025-4-1 02:33
New Labour and Public Expenditure,ctive DNS probing have made it possible to construct effective BotGRABBER detection system for botnets, which uses such evasion techniques as cycling of IP mapping, “domain flux”, “fast flux”, DNS-tunneling. BotGRABBER system is based on a cluster analysis of the features obtained from the payload o作者: Ejaculate 時間: 2025-4-1 08:56