Comparison of TCP Variants Over Self-Similar Traffic
Network traffic of Internet will continue to expand in terms of both volume and users, and transmission congestion protocol (TCP) is accounting for more than 90% the Internet traffic. In addition to this, it is well known that Internet traffic exhibits self-similarity, which cannot be described by t...
| Main Authors: | Salleh, Mazleena, Abu Bakar, Ahmad Zaki |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2005
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/3359/ http://eprints.utm.my/3359/1/ahmad_zaki_-_Comparison_of_TCP_Variants_Over_Self-Similar_Traffic.pdf |
Similar Items
Performance of transmission control protocol on self-similar traffic.
by: Salleh, Mazleena, et al.
Published: (2005)
by: Salleh, Mazleena, et al.
Published: (2005)
Simulating self-similar vbr traffic / Malini Subramaniam
by: Malini, Subramaniam
Published: (2004)
by: Malini, Subramaniam
Published: (2004)
Iterative window size estimation on self-similarity measurement for network traffic anomaly detection
by: Idris, Mohd. Yazid, et al.
Published: (2004)
by: Idris, Mohd. Yazid, et al.
Published: (2004)
Fast optimization method : the window size and hurst parameter estimator on self-similar network traffic
by: Idris, Mohd. Yazid, et al.
Published: (2007)
by: Idris, Mohd. Yazid, et al.
Published: (2007)
Uncovering anomaly traffic based on loss of self-similarity behavior using second order statistical model
by: Rohani, M. F., et al.
Published: (2007)
by: Rohani, M. F., et al.
Published: (2007)
The sign tale of hurst parameter: a revisit
by: Salleh, Mazleena, et al.
Published: (2007)
by: Salleh, Mazleena, et al.
Published: (2007)
The sign tale of hurst parameter : a revisit
by: Salleh, Mazleena, et al.
Published: (2007)
by: Salleh, Mazleena, et al.
Published: (2007)
Smart community: The Malaysian perspective
by: Mohd Yassin, Noraniah, et al.
Published: (2004)
by: Mohd Yassin, Noraniah, et al.
Published: (2004)
Comparison of document similarity algorithms in extracting document keywords from an academic paper
by: Miah, M. Saef Ullah, et al.
Published: (2021)
by: Miah, M. Saef Ullah, et al.
Published: (2021)
Comparison of retrieval schemes based on different structure and similarity measures for Malaysia's fatwa
by: Ibrahim, Mohd. Nazri
Published: (2007)
by: Ibrahim, Mohd. Nazri
Published: (2007)
Applying covert channel in TCP Fast Open (TFO) / Mohamed Azran Aziz
by: Mohamed Azran , Aziz
Published: (2019)
by: Mohamed Azran , Aziz
Published: (2019)
Comparison and fusion of retrieval schemes based on different structures, similarity measures and weighting schemes
by: Wahlan, Mohammed Salem Farag
Published: (2006)
by: Wahlan, Mohammed Salem Farag
Published: (2006)
Self-similar network traffic using Successive Random Addition (SRA) algorithm / Hani Hamira Harun
by: Harun, Hani Hamira
Published: (2006)
by: Harun, Hani Hamira
Published: (2006)
Java TCP Server Load Balancer: Analysis And Comparison Of Its Load Balancing Algorithms
by: Abu Yan, Mohd Khir
Published: (2008)
by: Abu Yan, Mohd Khir
Published: (2008)
Algorithm for enhancing the QoS of video traffic over wireless mesh networks
by: A. Moh, Abdul Nasser, et al.
Published: (2019)
by: A. Moh, Abdul Nasser, et al.
Published: (2019)
Generation of self similar network traffic using DFGN algorithm / Che Ku Noreymie Che Ku Jusoh
by: Che Ku Jusoh, Che Ku Noreymie
Published: (2006)
by: Che Ku Jusoh, Che Ku Noreymie
Published: (2006)
Self-similar network traffic using Random Midpoint Displacement (RMD) algorithm / Jumaliah Saarini
by: Saarini, Jumaliah
Published: (2006)
by: Saarini, Jumaliah
Published: (2006)
Traffic engineering IP/GMPLS over WDM
by: Shaaya, Sharifah Azwa
Published: (2005)
by: Shaaya, Sharifah Azwa
Published: (2005)
Security guidelines of electronic academic assets
by: Ibrahim, Subariah, et al.
Published: (2002)
by: Ibrahim, Subariah, et al.
Published: (2002)
Recommended guidelines of electronic academic assets
by: Ibrahim, Subariah, et al.
Published: (2002)
by: Ibrahim, Subariah, et al.
Published: (2002)
Paraphrase Detection using String Similarity with Synonyms
by: Lee, Jun Choi, et al.
Published: (2015)
by: Lee, Jun Choi, et al.
Published: (2015)
The study of probability model for compound similarity searching
by: Salim, Naomie, et al.
Published: (2006)
by: Salim, Naomie, et al.
Published: (2006)
Image retrieval based on similarity score fusion
by: Mohd. Ali, Iliana
Published: (2007)
by: Mohd. Ali, Iliana
Published: (2007)
Inference networks for molecular database similarity searching
by: Abdo, Ammar, et al.
Published: (2008)
by: Abdo, Ammar, et al.
Published: (2008)
Performance evaluation of TCP, UDP and DCCP traffic over 4G network
by: Kamil, Wisam Abduladheem, et al.
Published: (2015)
by: Kamil, Wisam Abduladheem, et al.
Published: (2015)
A new variant of Petri net controlled grammars
by: Mohamad Jan, Nurhidaya, et al.
Published: (2015)
by: Mohamad Jan, Nurhidaya, et al.
Published: (2015)
Comparative study of probability models for compound similarity searching
by: Salim, Naomie, et al.
Published: (2005)
by: Salim, Naomie, et al.
Published: (2005)
Some properties and variants of weighted sticker systems
by: Gan, Yee Siang, et al.
Published: (2013)
by: Gan, Yee Siang, et al.
Published: (2013)
Predictive data mining based on similarity and clustering methods.
by: Defit, Sarjon, et al.
Published: (2000)
by: Defit, Sarjon, et al.
Published: (2000)
Reducing real-time traffic packet loss in mobile IPv6 using two tier buffer
by: M. Zaki, Salim
Published: (2008)
by: M. Zaki, Salim
Published: (2008)
An interface of wireless network traffic analysis
by: Mohamed Almoustafa, Ahmad Mohamed Jamil
Published: (2007)
by: Mohamed Almoustafa, Ahmad Mohamed Jamil
Published: (2007)
Electronic Voting System: Preliminary Study
by: Ibrahim, Subariah, et al.
Published: (2000)
by: Ibrahim, Subariah, et al.
Published: (2000)
Two variants of bonded parallel insertion systems and their generative power
by: Yosman, Ahmad Firdaus, et al.
Published: (2016)
by: Yosman, Ahmad Firdaus, et al.
Published: (2016)
Similarity-based virtual screening with a bayesian inference network
by: Abdo, Ammar, et al.
Published: (2008)
by: Abdo, Ammar, et al.
Published: (2008)
Variants of weighted sticker systems with different weighting spaces
by: Fong, Wan Heng, et al.
Published: (2014)
by: Fong, Wan Heng, et al.
Published: (2014)
Variants of weighted sticker systems with different weighting spaces
by: Fong, Wan Heng, et al.
Published: (2017)
by: Fong, Wan Heng, et al.
Published: (2017)
Fusion of similarity measures using genetic algorithm for searching chemical database
by: Rahman Ali, Yahya Ali Abdel
Published: (2007)
by: Rahman Ali, Yahya Ali Abdel
Published: (2007)
Similarity measure for retrieval of question items with multi-variable data sets
by: Che Hassan, Siti Hasrinafasya
Published: (2008)
by: Che Hassan, Siti Hasrinafasya
Published: (2008)
Image encryption algorithm based on chaotic mapping
by: Salleh, Mazleena, et al.
Published: (2003)
by: Salleh, Mazleena, et al.
Published: (2003)
Query routing using query feedback and similarity in unstructured peer to peer networks
by: Ishak, Iskandar, et al.
Published: (2008)
by: Ishak, Iskandar, et al.
Published: (2008)
Similar Items
-
Performance of transmission control protocol on self-similar traffic.
by: Salleh, Mazleena, et al.
Published: (2005) -
Simulating self-similar vbr traffic / Malini Subramaniam
by: Malini, Subramaniam
Published: (2004) -
Iterative window size estimation on self-similarity measurement for network traffic anomaly detection
by: Idris, Mohd. Yazid, et al.
Published: (2004) -
Fast optimization method : the window size and hurst parameter estimator on self-similar network traffic
by: Idris, Mohd. Yazid, et al.
Published: (2007) -
Uncovering anomaly traffic based on loss of self-similarity behavior using second order statistical model
by: Rohani, M. F., et al.
Published: (2007)