Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Networked control under random and malicious packet losses
We study cyber security issues in networked control of a linear dynamical system.
Specifically, the dynamical system and the controller are assumed to be connected through …
Specifically, the dynamical system and the controller are assumed to be connected through …
Throughput analysis and measurements in IEEE 802.11 WLANs with TCP and UDP traffic flows
There is a vast literature on the throughput analysis of the IEEE 802.11 media access control
(MAC) protocol. However, very little has been done on investigating the interplay between …
(MAC) protocol. However, very little has been done on investigating the interplay between …
[หนังสือ][B] AIMD dynamics and distributed resource allocation
Looking back, as we put the finishing touches to this book, it is hard to believe just how
fortunate we have been to complete a project of this type. We were incredibly lucky to have …
fortunate we have been to complete a project of this type. We were incredibly lucky to have …
Reliable detection of interest flooding attack in real deployment of named data networking
Named data networking (NDN) is a disruptive yet promising architecture for the future
Internet, in which the content diffusion mechanisms are shifted from the conventional host …
Internet, in which the content diffusion mechanisms are shifted from the conventional host …
Detection of interest flooding attacks in named data networking using hypothesis testing
TN Nguyen, R Cogranne, G Doyen… - 2015 IEEE international …, 2015 - ieeexplore.ieee.org
With the rapid growth of Internet traffic, new emerging network architectures are under
deployment. Those architectures will substitute the current IP/TCP network only if they can …
deployment. Those architectures will substitute the current IP/TCP network only if they can …
Constructing stochastic model of TCP throughput on basis of stationarity analysis
H Yoshida, K Satoda, T Murase - 2013 IEEE Global …, 2013 - ieeexplore.ieee.org
End-to-end TCP throughput on best-effort networks fluctuates widely depending on cross
traffic and radio interference, which degrades the quality of public cloud services. However …
traffic and radio interference, which degrades the quality of public cloud services. However …
A machine learning approach for packet loss prediction in science flows
Science networks and their hosted applications require large and frequent data transfers,
but these transfers are subject to network performance degradation, including queuing …
but these transfers are subject to network performance degradation, including queuing …
Event-triggered control over unreliable networks subject to jamming attacks
Event-triggered networked control of a linear dynamical system is investigated. Specifically,
the dynamical system and the controller are assumed to be connected through a …
the dynamical system and the controller are assumed to be connected through a …
Cross-layer interaction of TCP and ad hoc routing protocols in multihop IEEE 802.11 networks
In this research, we first investigate the cross-layer interaction between TCP and routing
protocols in the IEEE 802.11 ad hoc network. On-demand ad hoc routing protocols respond …
protocols in the IEEE 802.11 ad hoc network. On-demand ad hoc routing protocols respond …
Taxonomy and evaluation of TCP-friendly congestion-control schemes on fairness, aggressiveness, and responsiveness
SC Tsao, YC Lai, YD Lin - Ieee Network, 2007 - ieeexplore.ieee.org
Many TCP-friendly congestion control schemes have been proposed to pursue the TCP-
equivalence criterion, which states that a TCP-equivalent flow should have the same …
equivalence criterion, which states that a TCP-equivalent flow should have the same …