Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,398,569 papers from all fields of science
Search
Sign In
Create Free Account
Network traffic control
Known as:
Network traffic
In computer networking, network traffic control is the process of managing, controlling or reducing the network traffic, particularly Internet…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
12 relations
Bandwidth management
Cascading failure
Frame (networking)
Intel Active Management Technology
Expand
Broader (1)
Network performance
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Malware detection in Android by network traffic analysis
Mehedee Zaman
,
Tazrian Siddiqui
,
M. R. Amin
,
Md. Shohrab Hossain
International Conference on Network and System…
2015
Corpus ID: 256118
A common behavior of mobile malware is transferring sensitive information of the cell phone user to malicious remote servers. In…
Expand
Highly Cited
2012
Highly Cited
2012
Link weight assignment and loop-free routing table update for link state routing protocols in energy-aware internet
Steven S. W. Lee
,
P. Tseng
,
Alice Chen
Future generations computer systems
2012
Corpus ID: 30029875
Highly Cited
2006
Highly Cited
2006
Fast handover algorithm for IEEE 802.16e broadband wireless access system
D. Lee
,
K. Kyamakya
,
Jean Paul Umondi
International Symposium on Wireless Pervasive…
2006
Corpus ID: 15141074
IEEE 802.16e wireless metropolitan area networks refers to the new standard for broadband wireless access (BWA), which targets to…
Expand
Highly Cited
2006
Highly Cited
2006
Load Balancing in a Cluster Computer
P. Werstein
,
Hailing Situ
,
Zhiyi Huang
International Conference on Parallel and…
2006
Corpus ID: 16349131
This paper proposes a load balancing algorithm for distributed use of a cluster computer. It uses load information including CPU…
Expand
Highly Cited
2006
Highly Cited
2006
Wavelet-based Detection of DoS Attacks.
A. Dainotti
,
A. Pescapé
,
G. Ventre
2006
Corpus ID: 195602761
Automated detection of anomalies in network traffic is an important and challenging task. In this work we propose an automated…
Expand
Highly Cited
2006
Highly Cited
2006
Performance and overhead of semantic cache management
B. Jónsson
,
María Arinbjarnar
,
Bjarnsteinn Þórsson
,
M. Franklin
,
D. Srivastava
TOIT
2006
Corpus ID: 16689526
The emergence of query-based online data services and e-commerce applications has prompted much recent research on data caching…
Expand
Highly Cited
2004
Highly Cited
2004
Comparative analysis of traditional telephone and voice-over-Internet protocol (VoIP) systems
H. Chong
,
H. Matthews
IEEE International Symposium on Electronics and…
2004
Corpus ID: 11021693
This paper investigates the issues that need to be considered when deciding whether to implement voice-over-Internet protocol…
Expand
Highly Cited
2003
Highly Cited
2003
A novel DSR-based energy-efficient routing algorithm for mobile ad-hoc networks
J. Garcia
,
A. Kallel
,
Kyandoghere Kyamakya
,
K. Jobmann
,
Juan-Carlos Cano
,
P. Manzoni
IEEE 58th Vehicular Technology Conference. VTC…
2003
Corpus ID: 19388072
Mobile ad-hoc networks (MANETs) are wireless networks consisting of a collection of untethered nodes with no fixed infrastructure…
Expand
Highly Cited
2001
Highly Cited
2001
Informational network traffic model based on fractional calculus
V. Zaborovsky
,
R. Meylanov
International Conferences on Info-Tech and Info…
2001
Corpus ID: 120166342
A model is proposed which treats network traffic as a stochastic process with an infinite mean delay. Such a model can be used to…
Expand
Highly Cited
1987
Highly Cited
1987
Interprocessor Traffic Scheduling Algorithm for Multiple-Processor Networks
R. Bianchini
,
John Paul Shen
IEEE transactions on computers
1987
Corpus ID: 36277547
Recent research on parallel systems has shown that the most difficult problem for system designers and users is interprocessor…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE