Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A critical look at power law modelling of the Internet
This paper takes a critical look at the usefulness of power law models of the Internet. The
twin focuses of the paper are Internet traffic and topology generation. The aim of the paper is …
twin focuses of the paper are Internet traffic and topology generation. The aim of the paper is …
Detecting jumps from Lévy jump diffusion processes
Recent asset-pricing models incorporate jump risk through Lévy processes in addition to
diffusive risk. This paper studies how to detect stochastic arrivals of small and big Lévy …
diffusive risk. This paper studies how to detect stochastic arrivals of small and big Lévy …
Flow length and size distributions in campus Internet traffic
The efficiency of flow-based networking mechanisms strongly depends on traffic
characteristics and should thus be assessed using accurate flow models. For example, in …
characteristics and should thus be assessed using accurate flow models. For example, in …
Cooperative multi-agent bandits with heavy tails
A Dubey - International conference on machine learning, 2020 - proceedings.mlr.press
We study the heavy-tailed stochastic bandit problem in the cooperative multi-agent setting,
where a group of agents interact with a common bandit problem, while communicating on a …
where a group of agents interact with a common bandit problem, while communicating on a …
Radio base stations in the cloud
B Haberland, F Derakhshan… - Bell Labs Technical …, 2013 - ieeexplore.ieee.org
During the past few years, architectures for cellular radio networks like 3rd Generation
Partnership Project (3GPP) Long Term Evolution (LTE) have evolved towards flatter …
Partnership Project (3GPP) Long Term Evolution (LTE) have evolved towards flatter …
Understanding performance interference in next-generation HPC systems
Next-generation systems face a wide range of new potential sources of application
interference, including resilience actions, system software adaptation, and in situ analytics …
interference, including resilience actions, system software adaptation, and in situ analytics …
Multiplexing gains achieved in pools of baseband computation units in 4G cellular networks
T Werthmann, H Grob-Lipski… - 2013 IEEE 24th Annual …, 2013 - ieeexplore.ieee.org
The tremendous increase of mobile user traffic load within the last few years forces us to
efficiently use the wireless network and processing resources. Cloud computing and …
efficiently use the wireless network and processing resources. Cloud computing and …
Honeyboost: Boosting honeypot performance with data fusion and anomaly detection
With insider attacks becoming more common and costing organizations more every year, it
has never been more crucial to be able to predict when an insider attack may happen …
has never been more crucial to be able to predict when an insider attack may happen …
Long-range dependence analysis of Internet traffic
C Park, F Hernández-Campos, L Le… - Journal of Applied …, 2011 - Taylor & Francis
Long-range-dependent time series are endemic in the statistical analysis of Internet traffic.
The Hurst parameter provides a good summary of important self-similar scaling properties …
The Hurst parameter provides a good summary of important self-similar scaling properties …
A VAE approach to sample multivariate extremes
Generating accurate extremes from an observational data set is crucial when seeking to
estimate risks associated with the occurrence of future extremes which could be larger than …
estimate risks associated with the occurrence of future extremes which could be larger than …