文件名称:p2p流量控制
- 所属分类:
- 编程文档
- 资源属性:
- [PDF]
- 上传时间:
- 2011-06-09
- 文件大小:
- 10.22mb
- 下载次数:
- 0次
- 提 供 者:
- hxppine@yahoo.cn
- 相关连接:
- 无
- 下载说明:
- 别用迅雷下载,失败请重下,重下不扣分!
介绍说明--下载内容均来自于网络,请自行研究使用
(系统自动生成,下载前可以参看下载内容)
下载文件列表
压缩包 : p2p-detection.rar 列表 p2p detection\1 A methodology for P2P file-sharing traffic detection2.pdf p2p detection\10 Bandwidth Management for Peer-to-Peer Applications.pdf p2p detection\11 est Practices –Peer-to-Peer (P2P) Applications.pdf p2p detection\12 Check Point Application Intelligence.pdf p2p detection\13 Cisco-MANAGING PEER-TO-PEER TRAFFIC WITH CISCO SERVICE CONTROL TECHNOLOGY.pdf p2p detection\14 Controlling Peer to Peer BandwidthConsumption.pdf p2p detection\15 Controlling Peer-to-Peer Traffic.pdf p2p detection\16 Cross-Layer Peer-to-Peer Traffic Identification and Optimization Based on Active Networking.pdf p2p detection\17 Detecting policy violations through traffic analysis .pdf p2p detection\18 Detection and Localisation of Performance Limitations of TCP Connections on ADSL.pdf p2p detection\19 Finding Peer-To-Peer File-sharing Using Coarse Network Behaviors.pdf p2p detection\2 A methodology for P2P file-sharing traffic detection.pdf p2p detection\20 Flow-Based Identification of P2P Heavy-Hitters.pdf p2p detection\21 Identifying Known and Unknown Peer-to-Peer Traffic.pdf p2p detection\22 Identifying P2P Heavy-Hitters from Network-Flow Data.pdf p2p detection\23 Inherent Behaviors for On-line Detection of Peer-to-Peer File Sharing.pdf p2p detection\24 Internet Traf ClassiUsing Bayesian Analysis.pdf p2p detection\25 Locality, Network Control and Anomaly Detection.pdf p2p detection\26 Open Source VoIP Traffic Monitoring.pdf p2p detection\27 P2P Optimized Traffic Control.pdf p2p detection\28 Pollution in P2P File Sharing Systems.pdf p2p detection\29 Preventing Peer-to-Peer File Sharing Activity.pdf p2p detection\3 Managing Peer-to-Peer Traffic In Network Environments.pdf p2p detection\30 Saving over USD 5milion a year by controlling outbound P2P traffic.pdf p2p detection\31 Secure NetworksPeer-to-Peer Security Solution.pdf p2p detection\32 Tracking Anonymous PeertoPeer VoIP Calls on the Internetg.pdf p2p detection\33 Traffic Analysis From Stateful Firewall to Network Intrusion Detection System.pdf p2p detection\34 Traffic Classification Using Clustering Algorithms.pdf p2p detection\35 Transport Layer Identification of P2P Traffic.pdf p2p detection\36 ViewTrafficProfilesgeneratedbyPeer-to-Peer (P2P) Networking.pdf p2p detection\4 A Longitudinal Study of P2P Traffic Classification.pdf p2p detection\5 A New Method for P2P Traffic Identification Based on Support Vector Machine.pdf p2p detection\6 A Self-learning System for P2P Traffic Classification.pdf p2p detection\7 A Traffic Identification Method and Evaluations for a Pure P2P Application.pdf p2p detection\8 Accurate, Scalable In-Network Identi of P2P Traf Using Application Signatures.pdf p2p detection\9 Approaches To Controlling Peer-to-Peer Traffic A Technical Analysis.pdf p2p detection