The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In public cloud networks, applications of different tenants compete for the shared network bandwidth and thus might suffer from unpredictable performance. It is desirable for cloud providers to offer tenants with bandwidth guarantees. However, it is challenging to precisely abstract tenant bandwidth requirements for their intra- and inter-tenant communications and to achieve work conservation simultaneously...
Peer-to-Peer (P2P) applications have witnessed an increasing popularity in recent years, which brings new challenges to network management and traffic engineering (TE). As basic input information, P2P traffic matrices are of significant importance for TE. Because of the excessively high cost of direct measurement, many studies aim to model and estimate general traffic matrices, but few focus on P2P...
In this paper, we propose a general stochastic model for virus propagation on the online social network. The model considers the time interval of users re-login in SNS network, the number of users in one's friend list, and propagation mechanism, utilizes SEIR model, which is an epidemic model, and finally establishes the dynamic evolution equations. The dynamic evolution equations describe the change...
Evaluating the reliability of Internet routing is important for an ISP to assess existing peer relationships or establish new peer relationships. Existing algorithms for network reliability computations take all routing paths as inputs. However, these paths may not be actually available for routing because of the constraints of routing policies in the Internet. In this paper, we propose an algebraic...
Anomaly detection is to identify abnormal behaviors of a system. It plays an important role in Prognostics and System Health Management (PHM) which is applied to monitor spacecraft's performance, detect faults, identify the root cause of the fault, and predict the remaining useful life (RUL) in order to increase safety and reduce downtime of spacecraft in—orbit.
In this work the Fe-Mn bimetal oxide was synthesized and was used for the removal of chromium. It was found that the effective pH for adsorption of chromium was in the range of 5.0 to 7.0, and the removal percentage of chromium reached maximum at pH 6.0. The kinetic study showed that the adsorption of chromium was well described by pseudo-second-order model. The removal efficiency of chromium increased...
Recently, the characteristics of traceroute probe have been widely studied in the field of Internet topology discovery, which helps researchers to understand the role of Traceroute tool better, such as sampling bias, marginal utility and so on. In this paper, we study three raw datasets of traceroute probe of different platforms and observe an interesting phenomenon: in the process of one probe, every...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.