Artigos de revistas sobre o tema "Packet trace"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Packet trace".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.
Yang, Ming Hour. "Hybrid Single-Packet IP Traceback with Low Storage and High Accuracy". Scientific World Journal 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/239280.
Texto completo da fonteARYANTA, DWI, e BAYU AGUNG PRANATA. "Perancangan dan Analisis Redistribution Routing Protocol OSPF dan EIGRP". ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 2, n.º 2 (1 de julho de 2014): 85. http://dx.doi.org/10.26760/elkomika.v2i2.85.
Texto completo da fontePang, Ruoming, Mark Allman, Vern Paxson e Jason Lee. "The devil and packet trace anonymization". ACM SIGCOMM Computer Communication Review 36, n.º 1 (10 de janeiro de 2006): 29–38. http://dx.doi.org/10.1145/1111322.1111330.
Texto completo da fonteDennis, Simone, e Helen Alexiou. "(Re)making smoking: Of packets and practice". Journal of Material Culture 23, n.º 4 (29 de setembro de 2018): 459–71. http://dx.doi.org/10.1177/1359183518799537.
Texto completo da fonteARYANTA, DWI, ARSYAD RAMADHAN DARLIS e DIMAS PRIYAMBODHO. "Analisis Kinerja EIGRP dan OSPF pada Topologi Ring dan Mesh". ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 2, n.º 1 (1 de janeiro de 2014): 53. http://dx.doi.org/10.26760/elkomika.v2i1.53.
Texto completo da fontePaxson, Vern. "Automated packet trace analysis of TCP implementations". ACM SIGCOMM Computer Communication Review 27, n.º 4 (outubro de 1997): 167–79. http://dx.doi.org/10.1145/263109.263160.
Texto completo da fonteEt. al., Dr B. Shadaksharappa,. "Attack Prediction By Using Greedy Algorithm For Diminishing The Drop And Delay In Wireless Sensor Networks". Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, n.º 6 (11 de abril de 2021): 1072–82. http://dx.doi.org/10.17762/turcomat.v12i6.2425.
Texto completo da fonteMemon, Mudasar Latif, Mukesh Kumar Maheshwari, Navrati Saxena, Abhishek Roy e Dong Ryeol Shin. "Artificial Intelligence-Based Discontinuous Reception for Energy Saving in 5G Networks". Electronics 8, n.º 7 (11 de julho de 2019): 778. http://dx.doi.org/10.3390/electronics8070778.
Texto completo da fonteSpiekermann, Daniel, e Jörg Keller. "Requirements for Crafting Virtual Network Packet Captures". Journal of Cybersecurity and Privacy 2, n.º 3 (6 de julho de 2022): 516–26. http://dx.doi.org/10.3390/jcp2030026.
Texto completo da fonteLiu, X., J. Xu, J. Yue e S. L. Vadas. "Numerical modeling study of the momentum deposition of small amplitude gravity waves in the thermosphere". Annales Geophysicae 31, n.º 1 (3 de janeiro de 2013): 1–14. http://dx.doi.org/10.5194/angeo-31-1-2013.
Texto completo da fonteBhuvaneshwari, P., e T. R. Jaya Chandra Lekha. "Design of Advanced High Performance Bus Tracer in System on Chip Using Matrix Based Compression for Low Power Applications". Journal of Computational and Theoretical Nanoscience 17, n.º 4 (1 de abril de 2020): 1852–56. http://dx.doi.org/10.1166/jctn.2020.8453.
Texto completo da fonteLan, Haoliang, Jie Xu, Qun Wang e Wei Ding. "Packet Loss Measurement Based on Sampled Flow". Symmetry 13, n.º 11 (10 de novembro de 2021): 2149. http://dx.doi.org/10.3390/sym13112149.
Texto completo da fonteJiang, Xi, Shinan Liu, Aaron Gember-Jacobson, Arjun Nitin Bhagoji, Paul Schmitt, Francesco Bronzino e Nick Feamster. "NetDiffusion: Network Data Augmentation Through Protocol-Constrained Traffic Generation". Proceedings of the ACM on Measurement and Analysis of Computing Systems 8, n.º 1 (16 de fevereiro de 2024): 1–32. http://dx.doi.org/10.1145/3639037.
Texto completo da fonteJiang, Xi, Shinan Liu, Aaron Gember-Jacobson, Arjun Nitin Bhagoji, Paul Schmitt, Francesco Bronzino e Nick Feamster. "NetDiffusion: Network Data Augmentation Through Protocol-Constrained Traffic Generation". ACM SIGMETRICS Performance Evaluation Review 52, n.º 1 (11 de junho de 2024): 85–86. http://dx.doi.org/10.1145/3673660.3655071.
Texto completo da fonteRoughan, Matt. "Public review for the devil and packet trace anonymization". ACM SIGCOMM Computer Communication Review 36, n.º 1 (10 de janeiro de 2006): 27–28. http://dx.doi.org/10.1145/1111322.1111329.
Texto completo da fonteChen, Jian, Siyu Kuai, Guoliang Chen, Lihua Yu e Qiwen Zhan. "Dynamical Modulation of Transverse Orbital Angular Momentum in Highly Confined Spatiotemporal Optical Vortex". Photonics 10, n.º 2 (31 de janeiro de 2023): 148. http://dx.doi.org/10.3390/photonics10020148.
Texto completo da fonteMa, Naji, e Ming Diao. "CoFi: Coding-Assisted File Distribution over a Wireless LAN". Symmetry 11, n.º 1 (10 de janeiro de 2019): 71. http://dx.doi.org/10.3390/sym11010071.
Texto completo da fonteYatskih, Alex, Yuri Yermolaev, Aleksandr Kosinov e Nikolay Semionov. "Wave Packet Excitation and its Development in Supersonic Boundary Layer". Siberian Journal of Physics 8, n.º 2 (1 de junho de 2013): 70–78. http://dx.doi.org/10.54362/1818-7919-2013-8-2-70-78.
Texto completo da fonteKarande, Shirish S., Kiran Misra e Hayder Radha. "Survival of the Fittest: An Active Queue Management Technique for Noisy Packet Flows". Advances in Multimedia 2007 (2007): 1–10. http://dx.doi.org/10.1155/2007/64695.
Texto completo da fonteMustapha, Oba Zubair, Muhammad Ali, Yim Fun Hu e Raed A. Abd-Alhameed. "Service-aware LSP selection with fuzzy based packet scheduling scheme for non-real time traffics". International Journal of Informatics and Communication Technology (IJ-ICT) 10, n.º 2 (1 de agosto de 2021): 126. http://dx.doi.org/10.11591/ijict.v10i2.pp126-139.
Texto completo da fonteAlyami, Mnassar, Abdulmajeed Alghamdi, Mohammed A. Alkhowaiter, Cliff Zou e Yan Solihin. "Random Segmentation: New Traffic Obfuscation against Packet-Size-Based Side-Channel Attacks". Electronics 12, n.º 18 (9 de setembro de 2023): 3816. http://dx.doi.org/10.3390/electronics12183816.
Texto completo da fonteObeidat, Ibrahim, Ala Mughaid e Shadi Alzoubi. "A Secure Encrypted Protocol for Clients' Handshaking in the Same Network". International Journal of Interactive Mobile Technologies (iJIM) 13, n.º 05 (21 de maio de 2019): 47. http://dx.doi.org/10.3991/ijim.v13i05.9845.
Texto completo da fonteIbrahim, Idris Skloul, Peter J. B. King e Hans-Wolfgang Loidl. "NsGTFA: A GUI Tool to Easily Measure Network Performance through the Ns2 Trace File". Journal of Intelligent Systems 24, n.º 4 (1 de dezembro de 2015): 467–77. http://dx.doi.org/10.1515/jisys-2014-0153.
Texto completo da fonteDong, Wei. "IPMT, an IPv6 Packet Manipulation Tool: Design Considerations and Applications". Applied Mechanics and Materials 543-547 (março de 2014): 3040–43. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3040.
Texto completo da fonteMiyim, Abubakar Muhammad. "Techniques for Throughput Enhancement in Wireless Networks". Journal of Communications Technology, Electronics and Computer Science 4 (16 de fevereiro de 2016): 1. http://dx.doi.org/10.22385/jctecs.v4i0.11.
Texto completo da fonteAlArnaout, Zakwan, Nour Mostafa, Samer Alabed, Wael Hosny Fouad Aly e Ahmed Shdefat. "RAPT: A Robust Attack Path Tracing Algorithm to Mitigate SYN-Flood DDoS Cyberattacks". Sensors 23, n.º 1 (22 de dezembro de 2022): 102. http://dx.doi.org/10.3390/s23010102.
Texto completo da fonteRusek, Krzysztof, Lucjan Janowski e Zdzisław Papir. "Transient and stationary characteristics of a packet buffer modelled as an MAP/SM/1/b system". International Journal of Applied Mathematics and Computer Science 24, n.º 2 (26 de junho de 2014): 429–42. http://dx.doi.org/10.2478/amcs-2014-0033.
Texto completo da fonteOhkuwa, Y., e T. Kitazoe. "Wave Packet in Quantum Cosmology and Definition of Semiclassical Time". International Journal of Modern Physics A 12, n.º 05 (20 de fevereiro de 1997): 859–71. http://dx.doi.org/10.1142/s0217751x97000657.
Texto completo da fonteTanveer Baig, Z., e Chandrasekar Shastry. "Smart Hybridized Routing Protocol for Animal Monitoring and Tracking Applications". Scalable Computing: Practice and Experience 23, n.º 4 (23 de dezembro de 2022): 339–49. http://dx.doi.org/10.12694/scpe.v23i4.2040.
Texto completo da fonteLin, Yi-Bing. "Parallel trace-driven simulation for packet loss in finite-buffered voice multiplexers". Parallel Computing 19, n.º 2 (fevereiro de 1993): 219–28. http://dx.doi.org/10.1016/0167-8191(93)90051-l.
Texto completo da fonteLin, Yi-Bing. "Parallel trace-driven simulation of packet-switched multiplexer under priority scheduling policy". Information Processing Letters 47, n.º 4 (setembro de 1993): 197–201. http://dx.doi.org/10.1016/0020-0190(93)90032-5.
Texto completo da fontePeng, Han Chuan, Li Feng Sha, Qiang Gan e Yu Wei. "Combining adaptive sigmoid packet and trace neural network for fast invariance-learning". Electronics Letters 34, n.º 9 (1998): 898. http://dx.doi.org/10.1049/el:19980667.
Texto completo da fonteMarciniak, Marian. "Towards broadband global optical and wireless networking". Journal of Telecommunications and Information Technology, n.º 3 (30 de setembro de 2004): 1–6. http://dx.doi.org/10.26636/jtit.2004.3.249.
Texto completo da fonteRAHMIATI, PAULINE, DWI ARYANTA e TAUFIQ AGUNG PRIYADI. "Perancangan dan Analisis Perbandingan Implementasi OSPF pada Jaringan IPv4 dan IPv6". ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 2, n.º 1 (1 de janeiro de 2014): 40. http://dx.doi.org/10.26760/elkomika.v2i1.40.
Texto completo da fonteGaliana-Merino, J. J., S. Parolai e J. Rosa-Herranz. "Seismic wave characterization using complex trace analysis in the stationary wavelet packet domain". Soil Dynamics and Earthquake Engineering 31, n.º 11 (novembro de 2011): 1565–78. http://dx.doi.org/10.1016/j.soildyn.2011.06.009.
Texto completo da fonteSAHNI, SARTAJ, e KUN SUK KIM. "EFFICIENT DYNAMIC LOOKUP FOR BURSTY ACCESS PATTERNS". International Journal of Foundations of Computer Science 15, n.º 04 (agosto de 2004): 567–91. http://dx.doi.org/10.1142/s0129054104002625.
Texto completo da fonteMishra, Abhishek kumar, Sara Ayoubi, Giulio Grassi e Renata Teixeira. "NemFi". ACM SIGCOMM Computer Communication Review 51, n.º 3 (11 de julho de 2021): 2–8. http://dx.doi.org/10.1145/3477482.3477484.
Texto completo da fonteS. Raj, Jennifer, e Abul Basar. "QOS OPTIMIZATION OF ENERGY EFFICIENT ROUTING IN IOT WIRELESS SENSOR NETWORKS". Journal of ISMAC 01, n.º 01 (9 de junho de 2019): 12–23. http://dx.doi.org/10.36548/jismac.2019.1.002.
Texto completo da fonteJan, Naveed, Ali Al-Bayatti, Naseer Alalwan e Ahmed Alzahrani. "An Enhanced Source Location Privacy based on Data Dissemination in Wireless Sensor Networks (DeLP)". Sensors 19, n.º 9 (2 de maio de 2019): 2050. http://dx.doi.org/10.3390/s19092050.
Texto completo da fontePeng, Guang-Qian, Guangtao Xue e Yi-Chao Chen. "Network Measurement and Performance Analysis at Server Side". Future Internet 10, n.º 7 (16 de julho de 2018): 67. http://dx.doi.org/10.3390/fi10070067.
Texto completo da fonteZhao, Ning, Xue Li, Mei Yang e Xin Ting Huang. "Vehicular Ad-Hoc Network and Routing Design". Applied Mechanics and Materials 641-642 (setembro de 2014): 829–32. http://dx.doi.org/10.4028/www.scientific.net/amm.641-642.829.
Texto completo da fonteChiesa, Marco, e Fábio L. Verdi. "Network Monitoring on Multi-Pipe Switches". Proceedings of the ACM on Measurement and Analysis of Computing Systems 7, n.º 1 (27 de fevereiro de 2023): 1–31. http://dx.doi.org/10.1145/3579321.
Texto completo da fonteBhaumik, Mani L. "Is the Quantum State Real in the Hilbert Space Formulation?" Quanta 9, n.º 1 (19 de dezembro de 2020): 37–46. http://dx.doi.org/10.12743/quanta.v9i1.142.
Texto completo da fonteRyzhov, Oleg S., e Sergey V. Timofeev. "Interaction of a potential vortex with a local roughness on a smooth surface". Journal of Fluid Mechanics 287 (25 de março de 1995): 21–58. http://dx.doi.org/10.1017/s002211209500084x.
Texto completo da fonteWare, Christopher, e Joe Chicharo. "Simulating capture behaviour in 802.11 radio modems". Journal of Telecommunications and Information Technology, n.º 3 (30 de setembro de 2001): 46–54. http://dx.doi.org/10.26636/jtit.2001.3.68.
Texto completo da fonteAleroud, Ahmed, Fan Yang, Sai Chaithanya Pallaprolu, Zhiyuan Chen e George Karabatis. "Anonymization of Network Traces Data through Condensation-based Differential Privacy". Digital Threats: Research and Practice 2, n.º 4 (31 de dezembro de 2021): 1–23. http://dx.doi.org/10.1145/3425401.
Texto completo da fonteSaputra, I. Wayan Adi, e I. Komang Ari Mogi. "Performance Analysis of MANET Proactive and Reactive Routing Protocols Using Network Simulator 2". JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) 8, n.º 3 (25 de janeiro de 2020): 251. http://dx.doi.org/10.24843/jlk.2020.v08.i03.p06.
Texto completo da fontede Prost, Nicolas, Bruno Mégarbane, Frank Questel, Vanessa Bloch, Delphine Cantin Bertaux, Jean Louis Pourriat e Antoine Rabbat. "Blood cocaine and metabolite pharmacokinetics after cardiac arrest in a body-packer case". Human & Experimental Toxicology 29, n.º 1 (19 de novembro de 2009): 49–53. http://dx.doi.org/10.1177/0960327109354940.
Texto completo da fonteShidaganti, Ganeshayya Ishwarayya, Amogh Shreedhar Inamdar, Sindhuja V. Rai e Anagha M. Rajeev. "SCEF: A Model for Prevention of DDoS Attacks From the Cloud". International Journal of Cloud Applications and Computing 10, n.º 3 (julho de 2020): 67–80. http://dx.doi.org/10.4018/ijcac.2020070104.
Texto completo da fonteGupta, Neha, Pradeep Kumar Juneja, Sachin Sharma e Umang Garg. "A proposed customized architecture for 5G-IoT based smart healthcare system: 5G-IoT-SHS". Journal of Information and Optimization Sciences 44, n.º 6 (2023): 1179–94. http://dx.doi.org/10.47974/jios-1456.
Texto completo da fonte