2011
DOI: 10.1007/978-3-642-22540-6_34
|View full text |Cite
|
Sign up to set email alerts
|

Improving Fairness in Network Traffic by Controlling Congestion and Unresponsive Flows

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 5 publications
0
4
0
Order By: Relevance
“…However, the discussion on the social justice framework needs to become an integral part of the self-driving vehicle technology development. Conclusively, the design perspective requires ethical reflections, as some of the engineering fields have already recognized [66][67][68][69][70], along with similar consideration for transportation planning practices [71,72].…”
Section: Development Of Social Justice Frameworkmentioning
confidence: 99%
“…However, the discussion on the social justice framework needs to become an integral part of the self-driving vehicle technology development. Conclusively, the design perspective requires ethical reflections, as some of the engineering fields have already recognized [66][67][68][69][70], along with similar consideration for transportation planning practices [71,72].…”
Section: Development Of Social Justice Frameworkmentioning
confidence: 99%
“…As part of a continuously evolving perception of engineering ethics (Schmidt 2014;Smith et al 2014), many engineering fields have already recognized the importance of ethics and social justice in designing new technologies (Grodzinsky 2000;Curiel--Esparza et al 2004;Beamon 2005;Kleijnen 2011;Azath et al 2011;Harvey 2010). From the perspective of social justice, the development of C2 presents enormous opportunities, but also two important dangers.…”
Section: The Relevance Of Social Justice For Traffic Controlmentioning
confidence: 99%
“…The state-of-art cloud-based IDS are not capable of identifying the abnormal activities that take place in the cloud environment and they are mainly focused on increasing the accuracy of the system rather than providing real-time solutions by analyzing the significant complexities. [20][21][22][23][24][25][26][27][28][29][30][31] This article presents a novel malicious detection and prediction system using two stages. Initially, a data preprocessing and detection system is built in the first stage.…”
Section: Introductionmentioning
confidence: 99%