Results 1 - 10
of
350
Deriving Traffic Demands for Operational IP networks: Methodology and Experience
- IEEE/ACM TRANSACTIONS ON NETWORKING
, 2001
"... Engineering a large IP backbone network without an accurate, network-wide view of the traffic demands is challenging. Shifts in user behavior, changes in routing policies, and failures of network elements can result in significant (and sudden) fluctuations in load. In this paper, we present a model ..."
Abstract
-
Cited by 297 (39 self)
- Add to MetaCart
of the necessary data. Specifically, we show how to infer interdomain traffic demands using measurements collected at a smaller number of edge links -- the peering links connecting to neighboring providers. We report on our experiences in deriving the traffic demands in the AT&T IP Backbone, by collecting
Predestination: Inferring Destinations from Partial Trajectories
- In Ubicomp
, 2006
"... Abstract. We describe a method called Predestination that uses a history of a driver’s destinations, along with data about driving behaviors, to predict where a driver is going as a trip progresses. Driving behaviors include types of destinations, driving efficiency, and trip times. Beyond consideri ..."
Abstract
-
Cited by 140 (14 self)
- Add to MetaCart
Abstract. We describe a method called Predestination that uses a history of a driver’s destinations, along with data about driving behaviors, to predict where a driver is going as a trip progresses. Driving behaviors include types of destinations, driving efficiency, and trip times. Beyond
On Inferring Application Protocol Behaviors in Encrypted Network Traffic
- Journal of Machine Learning Research
, 2006
"... Several fundamental security mechanisms for restricting access to network resources rely on the ability of a reference monitor to inspect the contents of traffic as it traverses the network. However, with the increasing popularity of cryptographic protocols, the traditional means of inspecting packe ..."
Abstract
-
Cited by 69 (5 self)
- Add to MetaCart
, timing, and direction. We first present what we believe to be the first exploratory look at protocol identification in encrypted tunnels which carry traffic from many TCP connections simultaneously, using only post-encryption observable features. We then explore the problem of protocol identification
Prediction of Driving Behavior Through Probabilistic Inference
- Proceedings of the Eighth International Conference on Engineering Applications of Neural Networks
, 2003
"... Abstract: Driving assistance systems are essential technologies to avoid traffic accidents, reduce traffic jams, and solve environmental problems. Not only observable behavioral data, but also unobservable inferred values should be considered to realize advanced driving assistance systems that are a ..."
Abstract
-
Cited by 8 (1 self)
- Add to MetaCart
Abstract: Driving assistance systems are essential technologies to avoid traffic accidents, reduce traffic jams, and solve environmental problems. Not only observable behavioral data, but also unobservable inferred values should be considered to realize advanced driving assistance systems
Understanding mobility based on GPS data
- in Proc. 10th Int. Conf. Ubiquitous Comput
"... Both recognizing human behavior and understanding a user’s mobility from sensor data are critical issues in ubiquitous computing systems. As a kind of user behavior, the transportation modes, such as walking, driving, etc., that a user takes, can enrich the user’s mobility with informative knowledge ..."
Abstract
-
Cited by 73 (13 self)
- Add to MetaCart
Both recognizing human behavior and understanding a user’s mobility from sensor data are critical issues in ubiquitous computing systems. As a kind of user behavior, the transportation modes, such as walking, driving, etc., that a user takes, can enrich the user’s mobility with informative
Bayesian online learning of driving behaviors
- in Int. Conf. on Robotics and Automation (ICRA
, 2011
"... Abstract-This paper presents a novel self-supervised online learning method to discover driving behaviors from data acquired with an inertial measurement unit (IMU) and a camera. Both sensors where mounted in a car that was driven by a human through a typical city environment with intersections, pe ..."
Abstract
-
Cited by 3 (2 self)
- Add to MetaCart
Abstract-This paper presents a novel self-supervised online learning method to discover driving behaviors from data acquired with an inertial measurement unit (IMU) and a camera. Both sensors where mounted in a car that was driven by a human through a typical city environment with intersections
On the Convergence of Statistical Techniques for Inferring Network Traffic Demands
, 2003
"... Accurate knowledge of traffic demands in a communication network enables or enhances a variety of traffic engineering and network management tasks of paramount importance for operational networks. Directly measuring a complete set of these demands is prohibitively expensive because of the huge amoun ..."
Abstract
-
Cited by 4 (0 self)
- Add to MetaCart
amounts of data that must be collected and the performance impact that such measurements would impose on the regular behavior of the network. As a consequence, we must rely on statistical techniques to produce estimates of actual traffic demands from partial information. The performance of such techniques
On Utilizing the Correlations between User Populations for Traffic Inference
, 2003
"... Network models today are often derived from two different methods. On one hand, detailed traffic models are generated based on traces from a single tap into the network. Alternatively, one can collect higher-level traffic-matrix data with SNMP from many routers. However, inferring flow-level details ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
Network models today are often derived from two different methods. On one hand, detailed traffic models are generated based on traces from a single tap into the network. Alternatively, one can collect higher-level traffic-matrix data with SNMP from many routers. However, inferring flow
An Empirical Approach to Modeling Inter-AS Traffic Matrices
- in IMC
, 2005
"... Recently developed techniques have been very successful in accurately estimating intra-Autonomous System (AS) traffic matrices. These techniques rely on link measurements, flow measurements, or routing-related data to infer traffic demand between every pair of ingress-egress points of an AS. They al ..."
Abstract
-
Cited by 54 (9 self)
- Add to MetaCart
Recently developed techniques have been very successful in accurately estimating intra-Autonomous System (AS) traffic matrices. These techniques rely on link measurements, flow measurements, or routing-related data to infer traffic demand between every pair of ingress-egress points of an AS
Type A Behavior Pattern, Risky Driving Behaviors, and Serious Road Traffic Accidents: A Prospective Study of the GAZEL Cohort
- Am. J. Epidemiol
, 2005
"... The type A behavior pattern (TABP), characterized by impatience, time urgency, and hostility, was originally developed in relation to coronary heart disease. Since 1986, there has been a debate on whether the TABP is also associated with risky driving behaviors leading to increased risks in road tra ..."
Abstract
-
Cited by 8 (2 self)
- Add to MetaCart
. The TABP was assessed in 1993 using the French version of the Bortner Rating Scale. Driving behaviors and serious RTAs were recorded in 2001. Sociodemo-graphic and alcohol consumption data were available from the cohort’s annual follow-up. The impact of the TABP on the risk of serious RTAs was assessed
Results 1 - 10
of
350