Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,728,482 papers from all fields of science
Search
Sign In
Create Free Account
Traffic shaping
Known as:
Shaping
, QOS Packet Scheduler
, Trafficshaping
Expand
Traffic shaping (also known as packet shaping) is a computer network traffic management technique which delays some or all datagrams to bring them…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Application delivery controller
Bandwidth management
Bandwidth-delay product
BitTorrent
Expand
Broader (1)
Network performance
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2009
Highly Cited
2009
Internet-scale service infrastructure efficiency
James R. Hamilton
International Symposium on Computer Architecture
2009
Corpus ID: 2176083
High-scale cloud services provide economies of scale of five to ten over small-scale deployments, and are becoming a large part…
Expand
Highly Cited
2008
Highly Cited
2008
Genetic, Social, and General Psychology Monographs, Feb 1998 v124 n1 p79(16)
Z. Jie
,
Shenghua Jin
2008
Corpus ID: 51757119
A study conducted on a national sample of 1433 individuals from China to examine effects of interpersonal relations on suicide…
Expand
Highly Cited
2007
Highly Cited
2007
The Status of Women, Sex Preference, Decision-Making and Fertility Control in Ekpoma Community of Nigeria
A. Eguavoen
,
Sims O. Odiagbe
,
G. I. Obetoh
2007
Corpus ID: 59463509
Abstract This study examined gender relationship and how this affect sex preference and decision-making in the home with…
Expand
Highly Cited
2005
Highly Cited
2005
Everyday innovators : researching the role of users in shaping ICT's
L. Haddon
2005
Corpus ID: 106896451
Frameworks: The Social, Unpredictable, and Innovatory Use of ICTs.- Beyond User-Centric Models of Product Creation.- Following…
Expand
Highly Cited
1999
Highly Cited
1999
Issues and solutions for authenticating MPEG video
Ching-Yung Lin
,
Shih-Fu Chang
Electronic imaging
1999
Corpus ID: 18128187
Video authentication techniques are used to prove the originality of received video content and to detect malicious tampering…
Expand
Highly Cited
1999
Highly Cited
1999
Trade unions and regional development
Riccardo Faini
1999
Corpus ID: 53996570
Highly Cited
1998
Highly Cited
1998
The concept of relevant time scales and its application to queuing analysis of self-similar traffic (or is Hurst naughty or nice?)
A. Neidhardt
,
Jonathan L. Wang
SIGMETRICS '98/PERFORMANCE '98
1998
Corpus ID: 2542348
Recent traffic analyses from various packet networks have shown the existence of long-range dependence in bursty traffic. In…
Expand
Highly Cited
1996
Highly Cited
1996
Response acquisition for music or beverages in adults with profound multiple handicaps
S. Gutowski
1996
Corpus ID: 144146311
Behavioral shaping procedures and adapted devices were used to establish controlled hand movements in two severely disabled…
Expand
Review
1995
Review
1995
Multiple reproductive strategies in snow crab, Chionoecetes opilio: Physiological pathways and behavioral plasticity
R. Elner
,
P. Beninger
1995
Corpus ID: 56407933
Highly Cited
1986
Highly Cited
1986
The influence of kinship and socialization on aggressive behaviour in rhesus monkeys (Macaca mulatta)
I. Bernstein
,
C. Ehardt
Animal Behaviour
1986
Corpus ID: 53148906
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE