Note on studying change point of LRD traffic based on Li's detection of DDoS flood attacking.
Xia, Zhengmin, Lu, Songnian, Tang, Junhua (2010)
Mathematical Problems in Engineering
Similarity:
Xia, Zhengmin, Lu, Songnian, Tang, Junhua (2010)
Mathematical Problems in Engineering
Similarity:
Li, Ming, Zhao, Wei, Chen, Shengyong (2011)
Mathematical Problems in Engineering
Similarity:
Lee, Yutae, Chung, Min Young, Lee, Tae-Jin (2008)
Mathematical Problems in Engineering
Similarity:
Ioannis E. Pountourakis (1997)
Kybernetika
Similarity:
C. Labbé, F. Reblewski, J.-M. Vincent (1998)
RAIRO - Operations Research - Recherche Opérationnelle
Similarity:
Domenech-Benlloch, Ma Jose, Gimenez-Guzman, Jose Manuel, Pla, Vicent, Martinez-Bauset, Jorge, Casares-Giner, Vicente (2008)
Mathematical Problems in Engineering
Similarity:
Joanna Domańska, Adam Domański, Dariusz Augustyn, Jerzy Klamka (2014)
International Journal of Applied Mathematics and Computer Science
Similarity:
Chen, Jianyong, Hu, Cunying, Ji, Zhen (2011)
Mathematical Problems in Engineering
Similarity:
Lim, J.-T. (1996)
Mathematical Problems in Engineering
Similarity:
Ioannis E. Pountourakis (2000)
Kybernetika
Similarity:
This paper examines appropriate protocols for high speed multiple access communication systems where the bandwidth is divided into two separate asymmetric channels. Both channels operate using slotted non-persistent CSMA or CSMA/CD techniques. Free stations access the first channel while all retransmissions occur in the second channel. We define the stability regions and the rules for optimal bandwidth allocation among the two channels for improvement of the system performance in case...
Nenad Dulanović, Dane Hinić, Dejan Simić (2008)
The Yugoslav Journal of Operations Research
Similarity: