Buscar
Mostrando ítems 31-40 de 52
Internet traffic shaping for IP over WDM links with source output buffering or multiple parallel wavelengths
(Kluwer Academic Publishers, 2001)
info:eu-repo/semantics/article,
Since the number of wavelengths per fiber is growing in an exponential fashion the over-
flow traffic can be routed through overflow lightpaths, thus providing an ideal network with
near-infinite capacity and almost ...
IPmiser: herramienta de medida and análisis de redes de alta velocidad
(1999)
info:eu-repo/semantics/conferenceObject,
Las redes de área extensa IP generan en la actualidad un
tráfico difícil de predecir y caracterizar. Así, se hace
necesario disponer de herramientas que proporcionen
monitorización en tiempo real de los enlaces, sin
interrupción ...
Pamplona-traceroute: topology discovery and alias resolution to build router level Internet maps
(IEEE, 2013)
info:eu-repo/semantics/conferenceObject,
An Internet topology map at the router level not
only needs to discover IP addresses in Internet paths (traceroute)
but also needs to identify IP addresses belonging to the same
router (IP aliases). Both processes, ...
Midiendo retardos y pérdidas en las redes móviles de alta velocidad
(2015)
info:eu-repo/semantics/conferenceObject,
Mobile networks are constantly evolving, but still,
due to their nature, it is not trivial to analayse how they face
up different kinds of traffic. On the Internet a wide range of
services can be found. Usually the majority ...
On the nature of unused TCP connections in web traffic
(2015)
info:eu-repo/semantics/conferenceObject,
The popularity of the web and the requirements
introduced by current web content have pushed for the development
of new techniques that meet these challenges and improve
the experience of the users. In particular, during ...
Ransomware early detection by the analysis of file sharing traffic
(Elsevier, 2018)
Artículo / Artikulua,
Crypto ransomware is a type of malware that locks access to user files by encrypting them and demands a ransom in order to obtain the decryption key. This type of malware has become a serious threat for most enterprises. ...
Remote access protocols for Desktop-as-a-Service solutions
(Public Library of Science, 2019)
Artículo / Artikulua,
The use of remote desktop services on virtualized machines is a general trend to reduce the cost of desktop seats. Instead of assigning a physical machine with its operating system and software to each user, it is considerably ...
TBDClust: time-based density clustering to enable free browsing of sites in pay-per-use mobile Internet providers
(Elsevier, 2017)
Artículo / Artikulua,
The World Wide Web has evolved rapidly, incorporating new content types and becoming more dynamic. The contents from a website can be distributed between several servers, and as a consequence, web traffic has become ...
Computation of traffic time series for large populations of IoT devices
(MDPI, 2018)
Artículo / Artikulua,
En este artículo se estudian las tecnicas para clasificar paquetes de tráfico de red en múltiples clases orientadas a la realización de series temporales de tráfico en escenarios de un elevado numero de clases como pueden ...
A passive traffic algorithm for detecting unavailable periods in TCP services
(IARIA, 2015)
Artículo / Artikulua,
This paper presents a simple passive algorithm to monitor
service availability. The algorithm is based on packet counting
over a passive traffic trace of a population of clients accessing
servers of interest. The major ...