X
Search Filters
Format Format
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
bandwidth (12) 12
engineering, electrical & electronic (11) 11
computer science (7) 7
computer science, information systems (7) 7
electric communication technique (7) 7
electricity (7) 7
telecommunications (7) 7
computer science, theory & methods (6) 6
internet (6) 6
networks (6) 6
resource management (6) 6
security (6) 6
transmission of digital information, e.g. telegraphiccommunication (6) 6
computer science, hardware & architecture (5) 5
ip networks (5) 5
mice (5) 5
network (5) 5
calculating (4) 4
computer communication networks (4) 4
computing (4) 4
counting (4) 4
delay (4) 4
network topology (4) 4
physics (4) 4
pricing (4) 4
qos (4) 4
response time (4) 4
scheduling (4) 4
switches (4) 4
tcp (4) 4
throughput (4) 4
time factors (4) 4
[ info.info-ni ] computer science [cs]/networking and internet architecture [cs.ni] (3) 3
anomaly detection (3) 3
channel allocation (3) 3
computer security (3) 3
conferences (3) 3
data center (3) 3
data centers (3) 3
datacenter (3) 3
electric digital data processing (3) 3
embedding (3) 3
feature extraction (3) 3
flows (3) 3
forensics (3) 3
information systems applications (3) 3
initial window (3) 3
mathematical models (3) 3
netzwerkverkehr (3) 3
optical (3) 3
optimization (3) 3
probabilistic logic (3) 3
quality of service (3) 3
reservation (3) 3
routing (3) 3
software engineering (3) 3
studies (3) 3
traffic engineering (3) 3
traffic flow (3) 3
access control (2) 2
adaptation models (2) 2
aggregates (2) 2
algorithms (2) 2
allocations (2) 2
analysis (2) 2
bandwidths (2) 2
classification (2) 2
cloud (2) 2
communications traffic (2) 2
complexity theory (2) 2
computer architecture (2) 2
computer centers (2) 2
computer crime (2) 2
computer simulation (2) 2
data security (2) 2
data-center (2) 2
ddos (2) 2
elephants (2) 2
entropy (2) 2
erbium (2) 2
future internet (2) 2
ip traceback (2) 2
machine learning (2) 2
management of computing and information systems (2) 2
markov processes (2) 2
network security (2) 2
networking and internet architecture (2) 2
netzwerk-security (2) 2
optical paths (2) 2
optical switches (2) 2
packet loss (2) 2
packet size (2) 2
performance (2) 2
privacy (2) 2
probabilistic packet marking (2) 2
protocol (2) 2
resilience (2) 2
resource allocation (2) 2
servers (2) 2
software (2) 2
more...
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Computer Networks, ISSN 1389-1286, 09/2012, Volume 56, Issue 13, pp. 3087 - 3098
The current TCP/IP architecture is known to be biased against flows of small sizes—small flows (or mice)—in the network, thereby affecting the completion times... 
Flows | QoS | Markov | AQM | Elephants | RED | IMPROVE | COMPUTER SCIENCE, HARDWARE & ARCHITECTURE | COMPUTER SCIENCE, INFORMATION SYSTEMS | TELECOMMUNICATIONS | QUEUE | ENGINEERING, ELECTRICAL & ELECTRONIC | Markov processes | Proboscidea | Studies | Packet switched networks | Queuing | Markov analysis | Computer architecture | TCP-IP
Journal Article
IEEE Transactions on Parallel and Distributed Systems, ISSN 1045-9219, 06/2014, Volume 25, Issue 6, pp. 1382 - 1392
Journal Article
Computer Networks, ISSN 1389-1286, 11/2015, Volume 91, pp. 283 - 297
Journal Article
Computer Networks, ISSN 1389-1286, 11/2014, Volume 73, pp. 84 - 97
This article addresses the problem of bandwidth sharing in data center networks. A promising approach is the use of advance bandwidth reservation systems.... 
Reservation | Data center | Bandwidth | Pricing | COMPUTER SCIENCE, HARDWARE & ARCHITECTURE | COMPUTER SCIENCE, INFORMATION SYSTEMS | TELECOMMUNICATIONS | ENGINEERING, ELECTRICAL & ELECTRONIC | Analysis | Studies | Network flow problem | Reservation systems | Bandwidths | Resource allocation | Optimization algorithms | Computer centers
Journal Article
IEEE Transactions on Parallel and Distributed Systems, ISSN 1045-9219, 06/2015, Volume 26, Issue 6, pp. 1754 - 1764
This article focuses on the problem of bandwidth allocation to users of Cloud data centers. An interesting approach is to use advance bandwidth reservation.... 
Adaptation models | Bandwidth | Pricing | Channel allocation | Data transfer | Resource management | Optimization | reservation | QoS | bandwidth | pricing | Cloud | COMPUTER SCIENCE, THEORY & METHODS | ENGINEERING, ELECTRICAL & ELECTRONIC
Journal Article
Computer Networks, ISSN 1389-1286, 05/2017, Volume 118, pp. 37 - 53
One of the important tasks for most network security solutions is to track network flows in real-time. The universe of flow identifiers being huge, hash tables... 
Flows | Hash tables | Security | Network | Resilience | BLOOM FILTER | COMPUTER SCIENCE, HARDWARE & ARCHITECTURE | PERFORMANCE | COMPUTER SCIENCE, INFORMATION SYSTEMS | TIME | TELECOMMUNICATIONS | CACHE | ENGINEERING, ELECTRICAL & ELECTRONIC | ELEPHANTS | Memory (Computers) | Security software
Journal Article
Digital Investigation, ISSN 1742-2876, 03/2017, Volume 20, pp. S56 - S65
Any machine exposed to the Internet today is at the risk of being attacked and compromised. Detecting attack attempts, be they successful or not, is important... 
Regression | Forensics | Security | Network | Traffic | COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS | ANOMALY DETECTION | COMPUTER SCIENCE, INFORMATION SYSTEMS | Safety and security measures | Data security | Analysis | Forensic sciences
Journal Article
IEEE Internet of Things Journal, ISSN 2327-4662, 02/2019, Volume 6, Issue 1, pp. 940 - 952
Journal Article
Computer Networks, ISSN 1389-1286, 05/2017, Volume 118, p. 37
One of the important tasks for most network security solutions is to track network flows in real-time. The universe of flow identifiers being huge, hash tables... 
Network analysis | Network management systems | Network security | Data structures | Data flow analysis | Real time | Computer security | Resilience
Journal Article
International Journal of Security and Networks, ISSN 1747-8405, 2017, Volume 12, Issue 3, pp. 168 - 187
The ability to detect insider threats is important for many organisations. However, the field of insider threat detection is not well understood. In this... 
Biometrics | Collusion | Insider threat | Psychosocial | Information theft | Masquerade | Detection | Security | Sabotage | Communication | Machine learning
Journal Article
2017 27th International Telecommunication Networks and Applications Conference (ITNAC), 11/2017, Volume 2017-, pp. 1 - 6
Security threats in the Internet have been ever increasing, in number, type and means used for attacks. In the face of large-scale attacks, such as DDoS... 
Adaptation models | security | mitigation | Materials handling | attack | Bandwidth | Control systems | Routing | DDoS | SDN | Computer crime | Optimization
Conference Proceeding
GLOBECOM 2017 - 2017 IEEE Global Communications Conference, 12/2017, Volume 2018-, pp. 1 - 6
Micro-blogging services like Twitter which allow users to post messages and follow activities are gaining in popularity. The content of the posted tweets is... 
Uniform resource locators | Tagging | Privacy | Data privacy | Twitter | Feature extraction
Conference Proceeding
2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 05/2017, pp. 886 - 891
Given the mice-elephant phenomenon (where 80% of flows in number contribute to only 20% of traffic in volume) of TCP traffic, TCP's slow-start algorithm plays... 
TCP | Computational modeling | Conferences | response time | Packet loss | Internet | queueing model | Time factors | initial window | mice | Queueing model | Mice | Initial window | Response time
Conference Proceeding
IEEE Transactions on Information Forensics and Security, ISSN 1556-6013, 03/2017, Volume 12, Issue 3, pp. 604 - 616
IP traceback plays an important role in cyber investigation processes, where the sources and the traversed paths of packets need to be identified. It has a... 
Cloud computing | Network topology | Forensics | Authentication | Systems architecture | access control | IP networks | IP traceback | cloud-based traceback | authentication | PRACTICAL TECHNIQUES | HIGH-SPEED INTERNET | COMPUTER SCIENCE, THEORY & METHODS | DDOS | PROBABILISTIC PACKET MARKING | SCHEMES | ENGINEERING, ELECTRICAL & ELECTRONIC
Journal Article
2013 IEEE International Conference on Communications (ICC), ISSN 1550-3607, 06/2013, pp. 3716 - 3720
Bandwidth-sharing in data-center networks is an important problem that affects the growth of multi-tenant datacenters. A promising solution approach is the use... 
data-center | Bandwidth | Pricing | Probabilistic logic | Dynamic scheduling | reservation | Resource management | Optimization | Erbium | bandwidth | pricing
Conference Proceeding
2018 IEEE 4th International Conference on Identity, Security, and Behavior Analysis (ISBA), 01/2018, Volume 2018-, pp. 1 - 8
Tracing the source and path of traffic flows is an important problem that is useful in different network security and forensic solutions. Many solutions have... 
Privacy | Network topology | Forensics | Scalability | Routing | Internet | IP networks
Conference Proceeding
2014 International Conference and Workshop on the Network of the Future (NOF), 12/2014, pp. 1 - 5
In the light of the mice-elephant phenomenon of the Internet traffic, TCP congestion control algorithm shows unfairness against flows of small sizes (small... 
Measurement | TCP | Receivers | ipfw/Dummynet | initial window | mice | Standards | lua script | Sockets | Linux | response time | Time factors | Kernel
Conference Proceeding
Computer Communications, ISSN 0140-3664, 09/2015, Volume 69, pp. 40 - 49
•Joint problem of bandwidth allocation and VM-placement in optical-electrical DC.•Challenges: (i) limited reachability due to the size of the optical switch in... 
Datacenter | Embedding | Virtual network | Optical | Bandwidth | PERFORMANCE | COMPUTER SCIENCE, INFORMATION SYSTEMS | TELECOMMUNICATIONS | ENGINEERING, ELECTRICAL & ELECTRONIC | Networks | Data centers | Optical paths | Computer simulation | Optical switching | Virtual networks | Optical communication | Switching theory
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.