Filters








85,941 Hits in 4.1 sec

A new anisotropic continuum traffic flow model with anticipation driving behavior

Yirong Kang, Shuhong Yang, A. Safuan Bin A. Rashid, A. Liu
2021 E3S Web of Conferences  
of traffic flow by introducing the information of anticipation driving behavior.  ...  Based on the anticipation driving car-following model, a new macro traffic flow model is established in this paper by considering the relationship between micro and macro variables.  ...  Therefore, this model can be used to explore the effect of expectation driving behavior on traffic flow in the process of car following on a single lane.  ... 
doi:10.1051/e3sconf/202128302036 fatcat:7tev44fnr5dsrproyao4xakpv4

A behavioral model of Web traffic

Hyoung-Kee Choi, J.O. Limb
Proceedings. Seventh International Conference on Network Protocols  
The increasing complexity of Web traffic has required that we base our model on the notion of a Web-request, rather a Web page.  ...  A Web-request results in the retrieval of information that might consist of one or more Web pages. The parameters of our model are derived from extensive traces of Web traffic.  ...  A Web-request is a page or a set of pages that results from an action of a user. This results in a model that more imitate user behavior.  ... 
doi:10.1109/icnp.1999.801961 dblp:conf/icnp/ChoiL99 fatcat:etmgo4q6rzfx7fa6c2cqq2xsby

Remembering what we like: Toward an agent-based model of Web traffic [article]

Bruno Goncalves, Mark R. Meiss, Jose J. Ramasco, Alessandro Flammini, Filippo Menczer
2009 arXiv   pre-print
Analysis of aggregate Web traffic has shown that PageRank is a poor model of how people actually navigate the Web.  ...  Using the empirical traffic patterns generated by a thousand users over the course of two months, we characterize the properties of Web traffic that cannot be reproduced by Markovian models, in which destinations  ...  BG was supported in part by NIH grant 1R21DA024259 and would like to thank A. Vespignani and S. Boettcher.  ... 
arXiv:0901.3839v1 fatcat:3ssuvvjarbeundvek6hjbpxfyi

Source Traffic Modeling of Wireless Applications

Phuoc Tran-Gia, Dirk Staehle, Kenji Leibnitz
2001 AEU - International Journal of Electronics and Communications  
To plan these networks detailed models of data users with diverse applications are required. The purpose of this study is to provide practically usable traffic models for data users in GPRS networks.  ...  A practical model of mobile HTTP users, based on an extrapolation of WWW users in current wire-line networks, is presented; this model is expected to be accurate enough to be used in simulation studies  ...  In [Cho99] , Choi and Limb presented a comprehensive model for Web traffic, called the "behavioral model".  ... 
doi:10.1078/1434-8411-00005 fatcat:bqgei4wpyvfo3pag7vzrioglx4

Measuring the Normality of Web Proxies' Behavior Based on Locality Principles [chapter]

Yi Xie, Shun-zheng Yu
2008 Lecture Notes in Computer Science  
This paper fills an void in this area by proposing a new server-side detection scheme based on the behavior characteristics of proxy-to-server Web traffic.  ...  The entropies of those pending Web traffics launched by proxies fitting to the model are used as the criterion for attack detection.  ...  Much previous work on Web proxy [7] [8] has approved stack of object references is a good model for characterizing the behavior of proxies and caches.  ... 
doi:10.1007/978-3-540-88140-7_6 fatcat:ba2hoikd75dlfgidchkgqjw7pm

Mining Web User Behaviors to Detect Application Layer DDoS Attacks

Chuibi Huang, Jinlin Wang, Gang Wu, Jun Chen
2014 Journal of Software  
Based on the access features, an extended hidden semi-Markov model is proposed to describe the browsing behaviors of web user.  ...  A clustering method is applied to extract the access features of the web objects.  ...  We can see that the algorithm can correctly detect the app-DDoS attacks which happened with a flash crowd event by making use of the dynamic HsMM models of web user behaviors.  ... 
doi:10.4304/jsw.9.4.985-990 fatcat:i7t3ojsdwfavdp5kthdxlz56fa

Digital Marketing Enhancement of Cryptocurrency Websites through Customer Innovative Data Process

Damianos P. Sakas, Nikolaos T. Giannakopoulos, Nikos Kanellos, Christos Tryfonopoulos
2022 Processes  
Therefore, a model consisting of three stages was applied.  ...  web traffic and digital reputation.  ...  Anent to customer engagement, it also consists of various user web metrics that combined characterize the behavior of a website customer.  ... 
doi:10.3390/pr10050960 fatcat:3gz35ixncjgdjhywugklcfqa4u

Agents, bookmarks and clicks

Mark R. Meiss, Bruno Gonçalves, José J. Ramasco, Alessandro Flammini, Filippo Menczer
2010 Proceedings of the 21st ACM conference on Hypertext and hypermedia - HT '10  
Analysis of aggregate and individual Web traffic has shown that PageRank is a poor model of how people navigate the Web.  ...  Using the empirical traffic patterns generated by a thousand users, we characterize several properties of Web traffic that cannot be reproduced by Markovian models.  ...  This work was supported in part by a gift from Google.  ... 
doi:10.1145/1810617.1810658 dblp:conf/ht/MeissGRFM10 fatcat:7uch2vwyovgqjajdie5fpncjwu

Revisiting coexistence of poissonity and self-similarity in Internet traffic

H. Gupta, A. Mahanti, V.J. Ribeiro
2009 2009 IEEE International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems  
In light of these changes, this paper revisits Internet traffic characteristics and models that were proposed when "traditional" Web traffic was the largest contributor to Internet traffic.  ...  streaming have significantly altered the composition of Internet traffic with respect to what it was a few years ago.  ...  ACKNOWLEDGEMENTS We thank Martin Arlitt, Arzad Kherani, and Carey Williamson for discussions during early stages of this work.  ... 
doi:10.1109/mascot.2009.5366239 dblp:conf/mascots/GuptaMR09 fatcat:xy5ks2x5lbgllpgpt67a7t6hje

Realistic Traffic Generation for Web Robots

Kyle Brown, Derek Doran
2017 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA)  
It generates traffic that accounts for both the temporal and behavioral qualities of robot traffic by statistical and Bayesian models that are fitted to the properties of robot traffic seen in web logs  ...  Web traffic generation is a classic research problem, no generator accounts for the characteristics of web robots or crawlers that are now the dominant source of traffic to a web server.  ...  Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the NSF.  ... 
doi:10.1109/icmla.2017.0-161 dblp:conf/icmla/BrownD17 fatcat:ilmjwfjuuzd75dy43kwg7n7f3m

On the feasibility of utilizing correlations between user populations for traffic inference

Kun-chan Lan, J. Heidema
2005 The IEEE Conference on Local Computer Networks 30th Anniversary (LCN'05)l  
First, based on traces of web traffic collected from two different sources, we observe that the user-behavior parameters of the traffic (such as user "think" time in web traffic) are correlated across  ...  Network models today are often derived from two different methods. On one hand, detailed traffic models are generated based on traces from a single tap into the network.  ...  We characterize web traffic as a three-level application level model as shown in Figure 2 .  ... 
doi:10.1109/lcn.2005.97 dblp:conf/lcn/LanH05 fatcat:purzmy3u2vadxpwvscsislzdiy

WDA: A Web farm Distributed Denial Of Service attack attenuator

Ehud Doron, Avishai Wool
2011 Computer Networks  
Such attacks are carried out by a "Bot net", an army of zombie hosts spread around the Internet, that overwhelm the bandwidth toward their victim Web server, by sending traffic upon command.  ...  A key feature of WDA is in its use of randomized thresholds that trap and penalize deterministic zombie traffic that tries to mimic human client patterns.  ...  Quantitative Models For the design of WDA, and for a realistic performance evaluation, we need a quantified statistical model of Web traffic.  ... 
doi:10.1016/j.comnet.2010.05.001 fatcat:nqldxyeuyjfyfjqyipa2fyl264

Structural analysis of behavioral networks from the Internet

M R Meiss, F Menczer, A Vespignani
2008 Journal of Physics A: Mathematical and Theoretical  
For example, we find that the structure of the behavioral network associated with Web activity is characterized by such extreme heterogeneity as to challenge any simple attempt to model Web server traffic  ...  We present a characterization of the properties of the behavioral networks generated by several million users of the Abilene (Internet2) network.  ...  This work is funded in part by NSF awards 0348940 and 0513650 to FM and AV respectively, and by the Indiana University School of Informatics.  ... 
doi:10.1088/1751-8113/41/22/224022 fatcat:65ft2ayatjfo3nbmof6pdbehom

Modeling Traffic on the Web Graph [chapter]

Mark R. Meiss, Bruno Gonçalves, José J. Ramasco, Alessandro Flammini, Filippo Menczer
2010 Lecture Notes in Computer Science  
Analysis of aggregate and individual Web requests shows that Page-Rank is a poor predictor of traffic.  ...  We can thereby identify a few salient features that are necessary and sufficient to interpret Web traffic data.  ...  JJR is funded by the project 233847-Dynanets of the EUC. This material is based upon work supported by NSF award 0705676. This work was supported in part by a gift from Google.  ... 
doi:10.1007/978-3-642-18009-5_6 fatcat:5kfaaffemvfhllybn35fr2gvh4

Rapid model parameterization from traffic measurements

Kun-Chan Lan, John Heidemann
2002 ACM Transactions on Modeling and Computer Simulation  
Rather than treating measured traffic as a time-series of statistics, we utilize the traces to estimate end-user behavior and network conditions to generate application-level simulation models.  ...  The utility of simulations and analysis heavily relies on good models of network traffic.  ...  For collection of traces we would like to thank Vern Paxson of ICIR and Jim Koda of ISI for their help. We would like to thank F.  ... 
doi:10.1145/643114.643117 fatcat:cehzzkxebfb4bo3vmaddugvcja
« Previous Showing results 1 — 15 out of 85,941 results