Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,298,573 papers from all fields of science
Search
Sign In
Create Free Account
Network traffic control
Known as:
Network traffic
In computer networking, network traffic control is the process of managing, controlling or reducing the network traffic, particularly Internet…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
12 relations
Bandwidth management
Cascading failure
Frame (networking)
Intel Active Management Technology
Expand
Broader (1)
Network performance
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2014
Review
2014
A Survey of parallel intrusion detection on graphical processors
L. Vokorokos
,
M. Ennert
,
M. Cajkovský
,
J. Radusovsky
Central European Journal of Computer Science
2014
Corpus ID: 10865944
Intrusion detection is enormously developing field of informatics. This paper provides a survey of actual trends in intrusion…
Expand
Highly Cited
2012
Highly Cited
2012
Link weight assignment and loop-free routing table update for link state routing protocols in energy-aware internet
Steven S. W. Lee
,
P. Tseng
,
Alice Chen
Future generations computer systems
2012
Corpus ID: 30029875
Highly Cited
2007
Highly Cited
2007
Network anomaly detection using nonextensive entropy
A. Ziviani
,
A. A. Gomes
,
Marcelo L. Monsores
,
Paulo S. S. Rodrigues
IEEE Communications Letters
2007
Corpus ID: 284273
Detection is a crucial step towards efficiently diagnosing network traffic anomalies within an autonomous system (AS). We propose…
Expand
Highly Cited
2006
Highly Cited
2006
Fast handover algorithm for IEEE 802.16e broadband wireless access system
D. Lee
,
K. Kyamakya
,
Jean Paul Umondi
International Symposium on Wireless Pervasive…
2006
Corpus ID: 15141074
IEEE 802.16e wireless metropolitan area networks refers to the new standard for broadband wireless access (BWA), which targets to…
Expand
Highly Cited
2006
Highly Cited
2006
Load Balancing in a Cluster Computer
P. Werstein
,
Hailing Situ
,
Zhiyi Huang
International Conference on Parallel and…
2006
Corpus ID: 16349131
This paper proposes a load balancing algorithm for distributed use of a cluster computer. It uses load information including CPU…
Expand
Highly Cited
2004
Highly Cited
2004
Can we contain Internet worms
Manuel Costa
,
J. Crowcroft
,
M. Castro
,
A. Rowstron
2004
Corpus ID: 8391329
Worm containment must be automatic because worms can spread too fast for humans to respond. Recent work has proposed a network…
Expand
Highly Cited
2003
Highly Cited
2003
A novel DSR-based energy-efficient routing algorithm for mobile ad-hoc networks
J. Garcia
,
A. Kallel
,
Kyandoghere Kyamakya
,
K. Jobmann
,
Juan-Carlos Cano
,
P. Manzoni
IEEE 58th Vehicular Technology Conference. VTC…
2003
Corpus ID: 19388072
Mobile ad-hoc networks (MANETs) are wireless networks consisting of a collection of untethered nodes with no fixed infrastructure…
Expand
Highly Cited
2001
Highly Cited
2001
Informational network traffic model based on fractional calculus
V. Zaborovsky
,
R. Meylanov
International Conferences on Info-Tech and Info…
2001
Corpus ID: 120166342
A model is proposed which treats network traffic as a stochastic process with an infinite mean delay. Such a model can be used to…
Expand
Highly Cited
2000
Highly Cited
2000
A Dynamic Approach to Reducing Dialog in On-Line Decision Guides
Michelle Doyle
,
P. Cunningham
EWCBR
2000
Corpus ID: 18739264
Online decision guides typically ask too many questions of the user, as they make no attempt to focus the questions. We describe…
Expand
Highly Cited
1987
Highly Cited
1987
Interprocessor Traffic Scheduling Algorithm for Multiple-Processor Networks
R. Bianchini
,
John Paul Shen
IEEE transactions on computers
1987
Corpus ID: 36277547
Recent research on parallel systems has shown that the most difficult problem for system designers and users is interprocessor…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE