000 | 05019nam a22006135i 4500 | ||
---|---|---|---|
001 | 978-3-642-12365-8 | ||
003 | DE-He213 | ||
005 | 20240730185610.0 | ||
007 | cr nn 008mamaa | ||
008 | 100322s2010 gw | s |||| 0|eng d | ||
020 |
_a9783642123658 _9978-3-642-12365-8 |
||
024 | 7 |
_a10.1007/978-3-642-12365-8 _2doi |
|
050 | 4 | _aTK5105.5-5105.9 | |
072 | 7 |
_aUKN _2bicssc |
|
072 | 7 |
_aCOM043000 _2bisacsh |
|
072 | 7 |
_aUKN _2thema |
|
082 | 0 | 4 |
_a004.6 _223 |
245 | 1 | 0 |
_aTraffic Monitoring and Analysis _h[electronic resource] : _bSecond International Workshop, TMA 2010, Zurich, Switzerland, April 7, 2010. Proceedings / _cedited by Fabio Ricciato, Marco Mellia, Ernst Biersack. |
250 | _a1st ed. 2010. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2010. |
|
300 |
_aX, 199 p. 70 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aComputer Communication Networks and Telecommunications, _x2945-9184 ; _v6003 |
|
505 | 0 | _aAnalysis of Internet Datasets -- Understanding and Preparing for DNS Evolution -- Characterizing Traffic Flows Originating from Large-Scale Video Sharing Services -- Mixing Biases: Structural Changes in the AS Topology Evolution -- Tools for Traffic Analysis and Monitoring -- EmPath: Tool to Emulate Packet Transfer Characteristics in IP Network -- A Database of Anomalous Traffic for Assessing Profile Based IDS -- Collection and Exploration of Large Data Monitoring Sets Using Bitmap Databases -- DeSRTO: An Effective Algorithm for SRTO Detection in TCP Connections -- Traffic Classification -- Uncovering Relations between Traffic Classifiers and Anomaly Detectors via Graph Theory -- Kiss to Abacus: A Comparison of P2P-TV Traffic Classifiers -- TCP Traffic Classification Using Markov Models -- K-Dimensional Trees for Continuous Traffic Classification -- Performance Measurements -- Validation and Improvement of the Lossy Difference Aggregator to Measure Packet Delays -- End-to-End Available Bandwidth Estimation Tools, An Experimental Comparison -- On the Use of TCP Passive Measurements for Anomaly Detection: A Case Study from an Operational 3G Network. | |
520 | _aThe Second International Workshop on Traffic Monitoring and Analysis (TMA 2010) was an initiative of the COST Action IC0703 "Data Traffic Monitoring and Analysis: Theory, Techniques, Tools and Applications for the Future Networks" (http:// www.tma-portal.eu/cost-tma-action). The COST program is an intergovernmental framework for European cooperation in science and technology, promoting the coordination of nationally funded research on a European level. Each COST Action aims at reducing the fragmentation in - search and opening the European research area to cooperation worldwide. Traffic monitoring and analysis (TMA) is nowadays an important research topic within the field of computer networks. It involves many research groups worldwide that are collectively advancing our understanding of the Internet. The importance of TMA research is motivated by the fact that modern packet n- works are highly complex and ever-evolving objects. Understanding, developing and managing such environments is difficult and expensive in practice. Traffic monitoring is a key methodology for understanding telecommunication technology and improving its operation, and the recent advances in this field suggest that evolved TMA-based techniques can play a key role in the operation of real networks. | ||
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aElectronic digital computers _xEvaluation. _921495 |
|
650 | 0 |
_aApplication software. _9139971 |
|
650 | 0 |
_aInformation storage and retrieval systems. _922213 |
|
650 | 0 |
_aElectronic data processing _xManagement. _9139972 |
|
650 | 1 | 4 |
_aComputer Communication Networks. _9139973 |
650 | 2 | 4 |
_aSystem Performance and Evaluation. _932047 |
650 | 2 | 4 |
_aComputer and Information Systems Applications. _9139974 |
650 | 2 | 4 |
_aInformation Storage and Retrieval. _923927 |
650 | 2 | 4 |
_aIT Operations. _931703 |
700 | 1 |
_aRicciato, Fabio. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9139975 |
|
700 | 1 |
_aMellia, Marco. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9139976 |
|
700 | 1 |
_aBiersack, Ernst. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9139977 |
|
710 | 2 |
_aSpringerLink (Online service) _9139978 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783642123641 |
776 | 0 | 8 |
_iPrinted edition: _z9783642123665 |
830 | 0 |
_aComputer Communication Networks and Telecommunications, _x2945-9184 ; _v6003 _9139979 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-642-12365-8 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c92911 _d92911 |