Traffic flow (computer networking)

Known as: Flow (computer networking), Communication flow, Packet flow 
In packet switching networks, traffic flow, packet flow or network flow is a sequence of packets from a source computer to a destination, which may… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
The article presents the statistical analysis results of an academic computer network traffic using the data gathered with… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
2011
2011
Privacy threat is one of the critical issues in multi-hop wireless networks, where attacks such as traffic analysis and flow… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2009
Highly Cited
2009
We consider the coordinated attitude control problem for a group of spacecraft, without velocity measurements. Our approach is… (More)
  • figure 1
  • table I
  • figure 2
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Privacy threat is one of the critical issues in network coding, where attacks such as traffic analysis can be easily launched by… (More)
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Article history: Business process redesign Received 26 February 2008 Received in revised form 2 October 2008 Accepted 19 October… (More)
  • table 1
  • figure 2
  • figure 3
  • figure 4
  • table 2
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Many proposed low-latency anonymous communication systems have used various flow transformations such as traffic padding, adding… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
2004
Highly Cited
2004
One of the fundamental limitations of the Internet is the inability of a packet flow recipient to halt disruptive flows before… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2003
Highly Cited
2003
In hostile environments, the enemy can launch traffic analysis against interceptable routing information embedded in routing… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 2
  • figure 5
Is this relevant?
2003
2003
End-to-end throughput guarantee is an important service semantics that network providers would like to offer to their customers… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
1987
Highly Cited
1987
Large grain data flow (LGDF) programming is natural and convenient for describing digital signal processing (DSP) systems, but… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 7
Is this relevant?