• No results found

self-similar data traffic

A Scheduling Model of Isochronous Frame Generation on Self-similar Traffic of AOS Multiplexing

A Scheduling Model of Isochronous Frame Generation on Self-similar Traffic of AOS Multiplexing

... Space Data System (CCSDS) is an international stand- ard organization, which composed of multinational space ...space data sys- tem. Advanced Orbit Systems (AOS) is a data transmit and communication ...

15

The sign tale of hurst parameter: a revisit

The sign tale of hurst parameter: a revisit

... network traffic is inherited from the operation of the transport protocol as well as the usage of the network applications by the users ...of self- similarity is insignificantly small and can be well ...

6

An Approximate Performance of Self-Similar Lognormal M 1 K Internet Traffic Model

An Approximate Performance of Self-Similar Lognormal M 1 K Internet Traffic Model

... Internet traffic data with the inherent condition of concurrent arrival of packets requires the use of heavy-tailed ...modeling self-similar Internet arrival ...simulated data confirm ...

7

A Self Similar Call Admission Control Algorithm in WiMAX

A Self Similar Call Admission Control Algorithm in WiMAX

... VBR traffic sources is set to 5, 10, 15, 20, 25, 30, 35, 40 respectively, and arrival rate λ ’ of CBR traffic sources equals 0 or 2, at the same time, in the simulation system SS-CAC algorithm and GCAC ...

9

A novel Self-Similar Traffic Prediction Method Based on Wavelet Transform for Satellite Internet

A novel Self-Similar Traffic Prediction Method Based on Wavelet Transform for Satellite Internet

... the self- similar degree will continuously ...the self-similarity of traffic has the adverse effect on satellite communication system, aggravating congestion of the network nodes, as well as vibration ...

5

Comparison of TCP Variants Over Self-Similar Traffic

Comparison of TCP Variants Over Self-Similar Traffic

... Network traffic has peak behavior over all timescales and thus it does not follow Poisson traffic behavior ...actual traffic measurements. Table 1 shows the comparison of Poisson and ...

6

Self Similar Network Traffic and Performance Evaluation pdf

Self Similar Network Traffic and Performance Evaluation pdf

... measurement data, with differingconclusions, is not surprising[26, ...given data provides insight into the causal and dynamic nature of the processes that generated the data in the ®rst ...

574

Enabling and exploiting self-similar central symmetry formations

Enabling and exploiting self-similar central symmetry formations

... In this work a formation flying based architecture is presented within the context of a distributed antenna array. An artificial potential function method is used to control the formation whereby deviation from an ...

26

Self similar Markov processes and the time inversion property

Self similar Markov processes and the time inversion property

... on self-similar Markov processes ...the self-similarity property for the general class of ssMps on R n , before considering abstractions of these processes restricted to R + and R given by the ...

129

The Compound Indexing of Human Self Similar Behavioural Patterns

The Compound Indexing of Human Self Similar Behavioural Patterns

... behavioural data segmentation and its subsequent complexity analysis using the Hurst ...sensory data that are important for multi-dimensional indica- tors applicable to diagnoses of altered ...reported ...

18

Positive measure self similar sets without interior

Positive measure self similar sets without interior

... on self-similar and self-affine sets; an ...of self-similar sets with positive Lebesgue measure, but with no interior? The method in Properties of measures supported on fat Sierpinski ...

5

Traffic occurrence detection using spatio temporal data mining

Traffic occurrence detection using spatio temporal data mining

... the traffic data based on the mile post ...the traffic data is analyzed and ...the traffic is less since it followed the adaptive learning ability and short detection response ...

6

SAFECO Safety of Shipping in Coastal Waters SAFECO FINAL REPORT Det Norske Veritas

SAFECO Safety of Shipping in Coastal Waters SAFECO FINAL REPORT Det Norske Veritas

... The main difficulty in use of accident data is to quantify the impact of implementing risk reducing measures before sufficient experience data become available. Even then it may be difficult to draw ...

50

Dimension conservation for self similar sets and fractal percolation

Dimension conservation for self similar sets and fractal percolation

... of self- similar sets. The conclusion applies to self-similar sets K such that their projection onto each line is the same as that of the convex hull of ...other self-similar ...

23

Methods for analysis of functionals on Gaussian self similar processes

Methods for analysis of functionals on Gaussian self similar processes

... There are also several other motivation for the study of the first passage functional other than its own importance, such as its relation to Burgers equation with random initial data (She et al. 1992, Bertoin ...

131

BGP Design for the Separation of the Local Big Data Traffic in Data Center

BGP Design for the Separation of the Local Big Data Traffic in Data Center

... users’ traffic to go through the idle ...user’s traffic according to the only policy of network for ...of traffic forwarding is limited by the process of additional server though the function of ...

10

Utilizing Monolingual Data in NMT for Similar Languages: Submission to Similar Language Translation Task

Utilizing Monolingual Data in NMT for Similar Languages: Submission to Similar Language Translation Task

... monolingual data in addition to parallel data be- cause the provided parallel data is very small in ...monolingual data of both languages and also trained an NMT system with copy data ...

5

Interactive Visualization for Network and Port Scan Detection

Interactive Visualization for Network and Port Scan Detection

... the data consists of only counts of activities (rather than records of the activities themselves), analysis can only go so ...suspicious traffic patterns, but it cannot see the traffic that caused ...

20

Discrete-Time continuous-dilation construction of linear scale-invariant systems and multi-dimensional self-similar signals

Discrete-Time continuous-dilation construction of linear scale-invariant systems and multi-dimensional self-similar signals

... Contents List of Figures x 1 Introduction 1 2 Background 5 2.1 2.2 Self-Similar Signals 2.1.1 Examples 2.1.2 Applications of Self-Similar Analysis Homogeneous Functions Self-Similar Stoc[r] ...

180

Self Learning Network Traffic Classification

Self Learning Network Traffic Classification

... Unsupervised Self Learning Network Traffic Classification is a semi-automated Internet flow traffic classifier which leverages unsupervised clustering algorithms to automatically group’s flows into ...

11

Show all 10000 documents...

Related subjects