نتایج جستجو برای: traffic analysis

تعداد نتایج: 2898804  

1999
Peter Reichl

Dynamic pricing models for network traffic often aim at deriving some relation between charges and current utilization of the network. This paper deals with such a price function that is a by-product of Kelly’s bound for the loss rate in highly connected networks and shows how the Refined Uniform Asymptotic Approximation RUAA, developed by Mitra et al., can be used to generalize the original ap...

2003
Yantai Shu Minfang Yu Jiakun Liu Oliver W. W. Yang

Seasonal ARIMA model is a good traffic model capable of capturing the behavior of a network traffic stream. In this paper, we give a general expression of seasonal ARIMA models with two periodicities and provide procedures to model and to predict traffic using seasonal ARIMA models. The experiments conducted in our feasibility study showed that seasonal ARIMA models can be used to model and pre...

2007
Olivier Paul

—This paper presents a new technique to improve the accuracy of a web traffic analysis tool. This technique is based on embedding relations existing between objects in a web site. We show how such relations can be used to improve the understanding a tool can get from network level measures.

2015
Sudhakar Mishra Shefali Sonavane Anil Gupta

To evaluate performance of different traffic generators, a comparison is required to find out most suitable traffic generator for particular application which could help researchers to evaluate a network in a better way. This paper presents a comprehensive survey of six most popular traffic generators. Traffic Generators are used to generate synthetic traffic to check network performance. Discu...

2010
Raymond Chi-Wing Wong Eric Lo

Sequence data analysis has been extensively studied in the literature. However, most previous work focuses on analyzing sequence data from a single source or party. In many applications such as logistics and network traffic analysis, sequence data comes from more than one source or party. When multiple autonomous organizations collaborate and integrate their sequence data to perform analysis, s...

2003
Wu-chi Feng Jin Choi Wu-chang Feng Jonathan Walpole

In this paper, we examine the DVD encoding process and the implications this process has video modeling and network traffic analysis. We have assembled a system that allows us to extract the video data from the DVDs as they were encoded for distribution. Analyzing the resulting video trace data, we describe how DVD encodings have evolved over time. In addition, our findings show that the underl...

2001
Toru Hasegawa Shigehiro Ano Koji Nakao Fumito Kubota

As the Internet has become an infrastructure for the global communication, a network failure and a quality degradation have become a serious problem. In order to solve the problem, a network monitoring system which monitors the traffic of Internet in real time is strongly desired. Traffic monitors which collect the statistics from captured packets play a key roll in the system; however, they ar...

Journal: :The Computer Science Journal of Moldova 2007
Gh. Mishkoy S. Giordano Andrei Iu. Bejan O. Benderschi

The variety of priority queueing systems with random switchover times is suggested in this paper. Such systems represent generalized models for a wide class of phenomena which involve queueing and prioritization and are considered in QoS and CoS network problems. The classification of such systems is given and methods of their analysis are discussed. Specialists in QoS and CoS technologies may ...

2009
Stefan Schiffner Sebastian Clauß

There exist well established models for anonymity focusing on traffic analysis, i. e., analysing properties of single messages as, e. g., timing. However there is only little work done that use linkability information, that is information about the probability that two messages have been sent by the same sender. In this paper we model information about linkability between messages as a weighted...

1994
Chyi-Ren Dow Mary Lou Soffa Shi-Kuo Chang

A transformation applied to optimize or parallelize a program may be found to be ineffective, or may be made invalid by code changes. In this paper, we present a technique to remove such transformations. The order of undoing the transformations is independent of the application order. The technique uses post conditions of a transformation to determine whether the transformation can be immediate...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید