• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 293
Next 10 →

The Importance of Long-Range Dependence of VBR Video Traffic in ATM Traffic Engineering: Myths and Realities

by Bong K. Ryu, Anwar Elwalid - IN PROC. ACM SIGCOMM '96 , 1996
"... There has been a growing concern about the potential impact of long-term correlations (second-order statistic) in variable-bit-rate (VBR) video traffic on ATM buffer dimensioning. Previous studies have shown that video traffic exhibits long-range dependence (LRD) (Hurst parameter large than 0.5). We ..."
Abstract - Cited by 144 (9 self) - Add to MetaCart
.5). We investigate the practical implications of LRD in the context of realistic ATM traffic engineering by studying ATM multiplexers of VBR video sources over a range of desirable cell loss rates and buffer sizes (maximum delays). Using results based on large deviations theory, we introduce the notion

The Importance of Long-Range Dependence of VBR Video Traffic in ATM Traffic Engineering: Myths and Realities

by Realities, Bong Ryu, Anwar Elwalid , 1996
"... There has been a growing concern about the potential impact of long-term correlations in variable bit rate (VBR) video traffic on ATM buffer dimensioning. Previous studies have shown that video traffic exhibits long-range dependence (LRD) (Hurst parameter large than 0.5). We investigate the practica ..."
Abstract - Add to MetaCart
the practical implications of LRD in the context of realistic ATM traffic engineering by studying ATM multiplexers of VBR video sources over a range of desirable cell loss rates and buffer sizes (maximum delays). Using results based on large deviations theory, we introduce the notion of Critical Time Scale

Traffic Control in ATM Networks: Engineering Impacts of Realistic Traffic Processes

by Ajit K. Jena‡ Adrian Popescu
"... This paper reviews the current state of the art in the rapidly developing areas of ATM traffic controls and traffic modeling, and identifies future research areas to facilitate the implementation of control methods that can support a desired quality of service without sacrificing network utilization ..."
Abstract - Add to MetaCart
This paper reviews the current state of the art in the rapidly developing areas of ATM traffic controls and traffic modeling, and identifies future research areas to facilitate the implementation of control methods that can support a desired quality of service without sacrificing network

Traffic Control in ATM Networks: Engineering Impacts of Realistic Traffic Processes

by Ajit Jena, Ajit K. Jena# Adrian Popescu, Ashok Erramilli
"... This paper reviews the current state of the art in the rapidlyidly 3105 areas of ATM traffic controls and traffic modeling, and identifies future research areas to facilitate the 31476-45445 of control methods that can support a desired quality of service without sacrificing network utilizations.ti ..."
Abstract - Add to MetaCart
This paper reviews the current state of the art in the rapidlyidly 3105 areas of ATM traffic controls and traffic modeling, and identifies future research areas to facilitate the 31476-45445 of control methods that can support a desired quality of service without sacrificing network utilizations

Realtime ATM Traffic Generation

by Christian Schuler , 1996
"... The evolution of new networking protocols has shown, that the conventional traffic models like Poisson are in many cases not suited for simulating real network behaviour [4]. This is especially true for ATM networks, because they will show a high complexity in their data rate dynamic due to statisti ..."
Abstract - Add to MetaCart
to statistical multiplexing of data, audio and video traffic. On the other hand realistic traffic models are necessary for many network engineering tasks like buffer dimensioning, quality of service estimation and resource planning. In this paper we propose an advanced approach to ATM traffic generation. We make

Location Privacy in Mobile Systems: A Personalized Anonymization Model

by Bugra Gedik, Ling Liu - IN: ICDCS , 2005
"... This paper describes a personalized k-anonymity model for protecting location privacy against various privacy threats through location information sharing. Our model has two unique features. First, we provide a unified privacy personalization framework to support location k-anonymity for a wide rang ..."
Abstract - Cited by 192 (8 self) - Add to MetaCart
CliqueCloak algorithms is studied under various conditions using realistic location data synthetically generated using real road maps and traffic volume data.

Simulating realistic network worm traffic for worm warning system design and testing

by Michael Liljenstam, David M. Nicol, Vincent H. Berk, Robert S. Gray - in Proceedings of the 2003 ACM workshop on Rapid Malcode , 2003
"... Reproducing the effects of large-scale worm attacks in a laboratory setup in a realistic and reproducible manner is an important issue for the development of worm detection and defense systems. In this paper, we describe a worm simulation model we are developing to accurately model the largescale sp ..."
Abstract - Cited by 58 (7 self) - Add to MetaCart
spread dynamics of a worm and many aspects of its detailed effects on the network. We can model slow or fast worms with realistic scan rates on realistic IP address spaces and selectively model local detailed network behavior. We show how it can be used to generate realistic input traffic for a working

On Selfish Routing in Internet-Like Environments

by Lili Qiu, Yang Richard Yang, Yin Zhang, Scott Shenker , 2004
"... A recent trend in routing research is to avoid inefficiencies in network-level routing by allowing hosts to either choose routes themselves (e.g., source routing) or use overlay routing networks (e.g., Detour or RON). Such approaches result in selfish routing, because routing decisions are no longe ..."
Abstract - Cited by 160 (10 self) - Add to MetaCart
to investigate the performance of selfish routing in Internet-like environments, using realistic topologies and traffic demands in our simulations. We show that in contrast to theoretical worst cases, selfish routing achieves close to optimal average latency in such environments. However, such performance

IP over ATM for multimedia traffic: MPLS

by Andrej Kos
"... Multiprotocol label switching (MPLS) is rapidly emerging as an Internet Engineering Task Force (IETF) standard. Intended to enhance speed scalability, and service provisioning capabilities in networks with internet protocol (IP). It uses a technique based on labels, to enable the implementation of s ..."
Abstract - Add to MetaCart
of simpler high performance packet forwarding engine. MPLS is a technology intended mostly for multimedia traffic in backbone networks. It can be used for IP as well as for other network-layer protocols. MPLS technology can be implemented over various link-level technologies, such as packet -- over

Realistic network traffic profile generation: theory and practice

by Antoine Varet, Nicolas Larrieu
"... Network engineers and designers need additional tools to generate network traffic in order to test and evaluate application performances or network provisioning for instance. In such a context, traffic characteristics are the very important part of the work. Indeed, it is quite easy to generate traf ..."
Abstract - Add to MetaCart
Network engineers and designers need additional tools to generate network traffic in order to test and evaluate application performances or network provisioning for instance. In such a context, traffic characteristics are the very important part of the work. Indeed, it is quite easy to generate
Next 10 →
Results 1 - 10 of 293
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University