派博傳思國際中心

標題: Titlebook: Computer Networks; 23rd International C Piotr Gaj,Andrzej Kwiecień,Piotr Stera Conference proceedings 2016 Springer International Publishin [打印本頁]

作者: STH    時間: 2025-3-21 17:31
書目名稱Computer Networks影響因子(影響力)




書目名稱Computer Networks影響因子(影響力)學科排名




書目名稱Computer Networks網絡公開度




書目名稱Computer Networks網絡公開度學科排名




書目名稱Computer Networks被引頻次




書目名稱Computer Networks被引頻次學科排名




書目名稱Computer Networks年度引用




書目名稱Computer Networks年度引用學科排名




書目名稱Computer Networks讀者反饋




書目名稱Computer Networks讀者反饋學科排名





作者: aesthetic    時間: 2025-3-21 21:08

作者: 劇本    時間: 2025-3-22 02:51
Monitoring and Analysis of Measured and Modeled Traffic of TCP/IP Networksm was described. The interface of the software system, and the algorithm of its work were presented. Topology of TCP/IP network in ACS department was shown. Developed software that outputs the results in graphical and tabular forms was represented. The relationship between real and simulated traffic
作者: pellagra    時間: 2025-3-22 05:05
Investigating Long-Range Dependence in E-Commerce Web Traffice intensity of LRD via the Hurst parameter are presented. Using a set of traces of a popular e-commerce site, the presence and the nature of LRD in Web traffic is examined. Our results confirm the self-similar nature of traffic at a Web server input, however the resulting estimates of the Hurst para
作者: 注射器    時間: 2025-3-22 09:13

作者: 鞭打    時間: 2025-3-22 13:01
Classification of Solutions to the Minimum Energy Problem in One Dimensional Sensor Networksf the distance between transmitter and receiver with any real exponent. We show, how these solutions can be utilized to solve the minimum energy problem for the data transmission cost matrix which is a linear combination of two power functions. We define the minimum energy problem in terms of the se
作者: 鞭打    時間: 2025-3-22 19:38

作者: institute    時間: 2025-3-22 22:26

作者: Irremediable    時間: 2025-3-23 04:01
Measuring Client-Server Anonymityrs. We present an accurate method for evaluating the amount of anonymity still available to such clients in the aftermath of an attack. Our method is based upon probabilities arrived at by the attack of possible client-server association levels for being the real one, along with the correctness leve
作者: 草率女    時間: 2025-3-23 06:25

作者: Bucket    時間: 2025-3-23 11:55
High-Interaction Linux Honeypot Architecture in Recent Perspective attacks for further analysis. Unfortunately, this field is not covered by recent publications. The paper analyses existing approaches and available open source solutions that can be used to form high-interaction honeypots first. Then the most prospective approach is chosen and best applicable tools
作者: STING    時間: 2025-3-23 15:30

作者: 遺忘    時間: 2025-3-23 20:03

作者: forebear    時間: 2025-3-24 00:32

作者: Accomplish    時間: 2025-3-24 05:40
Event-Driven Approach to Modeling and Performance Estimation of a Distributed Control Systemion. Simulation of the system operation in different conditions, performed during early development stages, allows to estimate performance and predict behavior of final implementation. In this paper new event-driven model of a DCS has been introduced and compared with the previous one. Structure of
作者: 痛苦一生    時間: 2025-3-24 07:43

作者: HOWL    時間: 2025-3-24 13:21
Expanding the Ns-2 Emulation Environment with the Use of Flexible Mappingrks in emulation mode. Our enhancements expand the build-in 1-to-1 MAC address mapping to 1-to-many address/port mapping, which allows the emulator to connect to more end-systems or subnetworks than the number of interfaces of the emulation server.
作者: Hangar    時間: 2025-3-24 15:46

作者: Scleroderma    時間: 2025-3-24 19:20
Measuring Client-Server Anonymityls of those associations. We demonstrate how additionally taking correctness levels into account results in more accurate anonymity measurement than the customary approach of just computing the Shannon entropy of the probabilities.
作者: forecast    時間: 2025-3-24 23:13
Algorithms for Transmission Failure Detection in a Communication System with Two Busesf exchanges, it is necessary to solve the problem of a failure occurrence so that to maintain the transmission continuity. The paper presents the methods of failure detection and algorithms used when such failure occurs.
作者: landfill    時間: 2025-3-25 03:50

作者: 大火    時間: 2025-3-25 08:36
1865-0929 72 submissions. They are organized in topical sections on computer networks architectures and protocols, teleinformatics and telecommunications, new technologies, queueing theory, and innovative applications. ?.978-3-319-39206-6978-3-319-39207-3Series ISSN 1865-0929 Series E-ISSN 1865-0937
作者: 填滿    時間: 2025-3-25 14:45
Physical Application: The Casimir Effect,rks in emulation mode. Our enhancements expand the build-in 1-to-1 MAC address mapping to 1-to-many address/port mapping, which allows the emulator to connect to more end-systems or subnetworks than the number of interfaces of the emulation server.
作者: 團結    時間: 2025-3-25 15:56

作者: 向前變橢圓    時間: 2025-3-25 22:07

作者: 外來    時間: 2025-3-26 02:07
https://doi.org/10.1057/9780230509412f exchanges, it is necessary to solve the problem of a failure occurrence so that to maintain the transmission continuity. The paper presents the methods of failure detection and algorithms used when such failure occurs.
作者: Supplement    時間: 2025-3-26 07:27

作者: 金盤是高原    時間: 2025-3-26 09:48
Lecture Notes in Physics Monographs by the sensors in the physical layer, when the transmitter adjust the power of its radio signal to the distance to the receiver, the optimal transmission is without interference. We also show, that the solutions of the minimum energy problem written in terms of data transmission cost matrix and in terms of the sensor signal power coincide.
作者: PHON    時間: 2025-3-26 14:40
The British Model of Political Economy,ralized self-organizing system that controls the traffic signals at multiple intersections in an urban road network. Experimental results show that the proposed method is useful for mitigating the negative impact of malicious data on the performance of traffic signal control.
作者: Classify    時間: 2025-3-26 19:34

作者: 事情    時間: 2025-3-26 23:32

作者: 食物    時間: 2025-3-27 02:33
https://doi.org/10.1057/9780230509412m and duration of failure detection on communication buses were presented. The authors tried to clarify whether a?failure detection in two buses transmission can have an influence on the delays of transmission. The paper consists of description of a test bench for time parameters measurements, the test results and conclusion.
作者: 額外的事    時間: 2025-3-27 06:07

作者: cleaver    時間: 2025-3-27 12:25
Real-Time Traffic over the Cognitive Packet Networkgoals that match the needs of real-time packet delivery in the presence of other background traffic under varied traffic conditions. The resulting design is evaluated via measurements of packet delay, delay variation (jitter) and packet loss ratio.
作者: 采納    時間: 2025-3-27 14:33
Classification of Solutions to the Minimum Energy Problem in One Dimensional Sensor Networks by the sensors in the physical layer, when the transmitter adjust the power of its radio signal to the distance to the receiver, the optimal transmission is without interference. We also show, that the solutions of the minimum energy problem written in terms of data transmission cost matrix and in terms of the sensor signal power coincide.
作者: 草率男    時間: 2025-3-27 20:03
Detection of Malicious Data in Vehicular Ad Hoc Networks for Traffic Signal Control Applicationsralized self-organizing system that controls the traffic signals at multiple intersections in an urban road network. Experimental results show that the proposed method is useful for mitigating the negative impact of malicious data on the performance of traffic signal control.
作者: 燒瓶    時間: 2025-3-28 00:59

作者: 思想    時間: 2025-3-28 05:48

作者: 群島    時間: 2025-3-28 08:46

作者: 文件夾    時間: 2025-3-28 11:10
QoE-Oriented Fairness Control for DASH Systems Based on the Hierarchical Structure of SVC Streamshich uses a?new utility function. This function based on a hierarchical structure of a SVC video stream. The properties of this solution were evaluated in a test environment that uses SDN principles. Functional features of the proposed control method were compared with standard algorithm of the adaptation used by DASH supported devices.
作者: CAMEO    時間: 2025-3-28 16:58

作者: 維持    時間: 2025-3-28 20:27
Lecture Notes in Physics Monographsb traffic is examined. Our results confirm the self-similar nature of traffic at a Web server input, however the resulting estimates of the Hurst parameter vary depending on the trace and the technique used.
作者: 馬具    時間: 2025-3-29 01:49

作者: 心胸開闊    時間: 2025-3-29 05:01

作者: dialect    時間: 2025-3-29 09:35
The Archetype that Waits: , and ,pen source solutions that can be used to form high-interaction honeypots first. Then the most prospective approach is chosen and best applicable tools are composed. The setup is tested eventually and its usefulness is proven.
作者: Nonconformist    時間: 2025-3-29 11:31
https://doi.org/10.1057/9780230509412 behavior of final implementation. In this paper new event-driven model of a DCS has been introduced and compared with the previous one. Structure of the model decreased simulation time and improved scalability of the approach, whereas precision of the results was not diminished.
作者: Regurgitation    時間: 2025-3-29 18:50
Investigating Long-Range Dependence in E-Commerce Web Trafficb traffic is examined. Our results confirm the self-similar nature of traffic at a Web server input, however the resulting estimates of the Hurst parameter vary depending on the trace and the technique used.
作者: Evolve    時間: 2025-3-29 23:31

作者: 冰雹    時間: 2025-3-30 02:11
Anti-evasion Technique for the Botnets Detection Based on the Passive DNS Monitoring and Active DNS of IP mapping, “domain flux”, “fast flux”, DNS-tunneling. BotGRABBER system is based on a cluster analysis of the features obtained from the payload of DNS-messages and uses active probing analysis. Usage of the developed method makes it possible to detect infected hosts by bots of the botnets with high efficiency.
作者: 象形文字    時間: 2025-3-30 04:08

作者: Crater    時間: 2025-3-30 08:47
Event-Driven Approach to Modeling and Performance Estimation of a Distributed Control System behavior of final implementation. In this paper new event-driven model of a DCS has been introduced and compared with the previous one. Structure of the model decreased simulation time and improved scalability of the approach, whereas precision of the results was not diminished.
作者: Tortuous    時間: 2025-3-30 13:02
https://doi.org/10.1007/978-3-319-39207-3computer crime; computer networks; distributed computing; Internet; network algorithms; network algorithm
作者: 易于    時間: 2025-3-30 19:01
978-3-319-39206-6Springer International Publishing Switzerland 2016
作者: Tracheotomy    時間: 2025-3-31 00:06
https://doi.org/10.1007/978-3-540-44757-3 popularisation of the Internet. Real-Time applications have strict Quality of Service (QoS) constraint, which poses a major challenge to IP networks. The Cognitive Packet Network (CPN) has been designed as a QoS-driven protocol that addresses user-oriented QoS demands by adaptively routing packets
作者: 創(chuàng)新    時間: 2025-3-31 02:29

作者: Goblet-Cells    時間: 2025-3-31 07:28
https://doi.org/10.1007/978-3-540-44757-3m was described. The interface of the software system, and the algorithm of its work were presented. Topology of TCP/IP network in ACS department was shown. Developed software that outputs the results in graphical and tabular forms was represented. The relationship between real and simulated traffic
作者: Lipoprotein(A)    時間: 2025-3-31 09:30

作者: 昏睡中    時間: 2025-3-31 15:19
https://doi.org/10.1007/978-3-540-44757-3 fairness score function ensures that no node is left without resources while on average everything looks good. It is compared with well-known and widely adopted function proposed by Jain, Chiu and Hawe and another one recently proposed fairness function by Chen and Zhang. The function proposed in t
作者: forestry    時間: 2025-3-31 18:59
Lecture Notes in Physics Monographsf the distance between transmitter and receiver with any real exponent. We show, how these solutions can be utilized to solve the minimum energy problem for the data transmission cost matrix which is a linear combination of two power functions. We define the minimum energy problem in terms of the se
作者: florid    時間: 2025-4-1 00:10

作者: 出沒    時間: 2025-4-1 02:33
New Labour and Public Expenditure,ctive DNS probing have made it possible to construct effective BotGRABBER detection system for botnets, which uses such evasion techniques as cycling of IP mapping, “domain flux”, “fast flux”, DNS-tunneling. BotGRABBER system is based on a cluster analysis of the features obtained from the payload o
作者: Ejaculate    時間: 2025-4-1 08:56





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
沂源县| 泾阳县| 渝北区| 蚌埠市| 库伦旗| 星座| 华亭县| 贵德县| 舟曲县| 鹤壁市| 满洲里市| 滕州市| 盐山县| 宁远县| 海盐县| 漳浦县| 公主岭市| 锡林郭勒盟| 会同县| 顺昌县| 富源县| 固原市| 玛沁县| 卢龙县| 大余县| 荆州市| 清丰县| 伊春市| 德化县| 莲花县| 连州市| 乌拉特中旗| 桑日县| 酉阳| 禹城市| 马山县| 安顺市| 简阳市| 昭通市| 万州区| 宜城市|