2019 IEEE International Symposium on Measurements &Amp; Networking (M&N) 2019
DOI: 10.1109/iwmn.2019.8804983
|View full text |Cite
|
Sign up to set email alerts
|

Comparison of Mobile and Fixed Device Workloads in an Academic Web Server

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…system utilisation (11) and normalization constant (12). Following the same procedure as discussed in section 2, the queue-length distribution beomes…”
Section: Numerical Results and Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…system utilisation (11) and normalization constant (12). Following the same procedure as discussed in section 2, the queue-length distribution beomes…”
Section: Numerical Results and Discussionmentioning
confidence: 99%
“…It is also observed that the service time of packets at network systems can be best explained by long-tail power-law distribution [11]. Besides, several other studies such as the one on reference time of files (time difference between successive requests of a file) as well as the intersession time (time difference between two sessions of a client) endorse the appearance of lognormal distribution [12], inter arrival time of cyberlocker traffic flows on cloud platform advocates hybrid lognormal and gamma distribution [13]. It is important to highlight that the lognormal and power law distributions are connected and appears as an alternative to each other [14].…”
Section: Introductionmentioning
confidence: 95%
“…These attacks can affect the wireless network security of Fog computing, which can take place between the cloud to things continuum. In general, the users trust the network configurations and data generated by the network traffic, which is usually managed manually by a network administrator [37][38][39]. As Fog nodes placed at the edge of the network, therefore, would be an unmanageable task for the network administrator.…”
Section: Network Securitymentioning
confidence: 99%