2017 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T) 2017
DOI: 10.1109/infocommst.2017.8246416
|View full text |Cite
|
Sign up to set email alerts
|

Method for calculating of R-learning traffic peakedness

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0
14

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 39 publications
(33 citation statements)
references
References 10 publications
0
19
0
14
Order By: Relevance
“…Additional scope of application of the method includes predicting the anomalous states of discrete processes. An example of such tasks is the calculation of the peaks of Internet traffic information system [16].…”
Section: Computer Sciencesmentioning
confidence: 99%
“…Additional scope of application of the method includes predicting the anomalous states of discrete processes. An example of such tasks is the calculation of the peaks of Internet traffic information system [16].…”
Section: Computer Sciencesmentioning
confidence: 99%
“…In [8][9][10][11], approaches to ensuring security and speed of data processing were proposed, but special attention should be paid to crypto-code systems based on the McEliece and Niederreiter schemes, which are quantum-stable [12,13].…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
“…High quality services require high bandwidth [3][4][5][6][7][8][9][10][11][12][13][14]. Therefore, the reduced use of network resources.…”
Section: Analysis Of the Literaturementioning
confidence: 99%