Modeling Web Quality-of-Experience on Cellular Networks
|
|
- Delphia Horn
- 7 years ago
- Views:
Transcription
1 Modeling Web Quality-of-Experience on Cellular Networks Athula Balachandran, Vaneet Aggarwal, Emir Halepovic, Jeffrey Pang, Srinivasan Seshan, Shobha Venkataraman, He Yan Carnegie Mellon University, AT&T Labs Research MobiCom 2014 Presented by Nawanol Theera-Ampornpunt 11 February, 2015
2 Motivation Cellular network characteristics affect users Quality-of- Experience (QoE) Signal strength Handovers Load of cell tower Network operators want to optimize network for QoE They cannot directly measure QoE Need to rely on model of relationship between network characteristics and QoE Goal: Model QoE metrics from network traces Application: web browsing 2 / 25
3 Uses of the Model Determine when network degradation actually affects user experience Give operators information about trade-offs among potential solutions Troubleshooting a problem Tweaking a network element Expanding the network 3 / 25
4 Previous Work Relies on client-side or server-side instrumentation Discovers how web QoE is affected by website designs web browsers network protocols This paper takes a cellular operator view of web QoE No detailed client-side or server-side logs Estimate QoE metrics using only network measurements 4 / 25
5 Contributions Develops a technique to reconstruct mobile web sessions and user clicks from HTTP traces Quantifies individual impact of network characteristics on mobile web QoE Develops machine-learning models for predicting web QoE from radio network characteristics 5 / 25
6 Data Sources Radio statistics RSSI (received signal strength indicator) Handovers End-to-end throughput Latency HTTP flows HTTP headers TCP flow duration, flags Anonymized device identifier Location: a major metropolitan area in western U.S. Duration: one month in 2012 All data sets are anonymized 6 / 25
7 Websites Analyzed Analysis focuses on three leading mobile websites in top 100 News Social Wiki HTTP trace contains (only visits to 3 websites above) 2 million web sessions 70 million HTTP requests 1 million unique devices Radio trace contains complete information about 100,000 of the HTTP sessions 7 / 25
8 QoE Metrics User engagement identified as key measure Session length Number of pages a user clicks through Abandonment rate Percentage of users who leave the website after visiting the landing page Both require identification of user clicks 8 / 25
9 Detecting Clicks - Baseline Common approach: use idle time between requests Requests for embedded objects are generated by browser Requests generated by clicks require user intervention Gives poor accuracy (~20% error) 9 / 25
10 Detecting Clicks - Approach Most embedded objects are hosted by third party Advertising agency Content Distribution Networks (CDNs) Analytics services Classify requests based on URLs Models trained separately for each website 10 / 25
11 Detecting Clicks Steps Group sessions based on Referrer header and IMEI hash 2. Extract features bag of words from domain name bag of words from URN type of content Example: Domain = <blog, xyz, com> URN =<my, blog, abc.html> Type = html 11 / 25
12 Detecting Clicks Steps Label data points Only include requests in the first 10 seconds of each session First request from a click Other requests for embedded objects 4. Running classification algorithm Naïve Bayes performs best 12 / 25
13 Detecting Clicks Results Feature Simple = Domain only Feature Diverse = All features Stream Structure = Previous work 13 / 25
14 QoE Metrics Revisited Session length and abandonment rate are also influenced by user interest Many web sessions are one click Not helpful in distinguishing satisfied and dissatisfied users 14 / 25
15 QoE Metrics Alternative Partial download ratio proposed as alternative Fraction of HTTP objects not completely downloaded Correlates well with session length 15 / 25
16 Network Factors Load Higher network load results in worse QoE QoE can be improved by Adding more cells Distributing users across cells to balance load 16 / 25
17 Network Factors RSSI Higher signal strength does not correlate with QoE 17 / 25
18 Network Factors ECNO Higher signal energy to inference (ECNO) correlates with better QoE ECNO is a better indicator of channel quality than RSSI RSSI includes power of noise and interference QoE is interference and noise limited, not power (i.e., coverage) limited 18 / 25
19 Network Factors Handovers Inter-radio-access-technology (IRAT) handovers have strongest impact on QoE Impacts of other handovers and failure events on QoE are negligible 19 / 25
20 Network Factors Data Rate Higher radio data rate does not lead to better QoE It has been shown that web browsing traffic is more latencylimited than throughput-limited 20 / 25
21 Modeling Web QoE Goal: Predict web QoE metrics based on network factors alone 1. Partial download ratio 2. Session length 3. Whether session includes partially downloaded pages 4. Whether user will abandon a session Different algorithms evaluated using 10-fold crossvalidation Linear regression works best for metrics 1 and 2 Decision tree works best for metrics 3 and 4 21 / 25
22 Results Partial Download Ratio Accuracy measured in root mean squared error (RMSE) Baseline: Always predict the mean Linear regression produces 20% lower RMSE than baseline 22 / 25
23 Results Session Length Linear regression produces 10% lower RMSE than baseline Session length is affected more by external factor (e.g., user interest) than partial download ratio 23 / 25
24 Results Binary Predictions Partial Whether session includes partially downloaded pages Abandonment Whether user will abandon a session Baseline: Always predict the majority class 24 / 25
25 Insights Linear regression coefficients for predicting partial download ratio Coefficients are relatively constant across datasets Similar conclusions for session length Inspecting individual decision trees confirms impact of network factors analyzed earlier 25 / 25
26 Questions?
Modeling Web Quality-of-Experience on Cellular Networks
Modeling Web Quality-of-Experience on Cellular Networks Athula Balachandran, Vaneet Aggarwal, Emir Halepovic, Jeffrey Pang, Srinivasan Seshan, Shobha Venkataraman, He Yan Computer Science Department, Carnegie
More informationWeb Browsing Quality of Experience Score
Web Browsing Quality of Experience Score A Sandvine Technology Showcase Contents Executive Summary... 1 Introduction to Web QoE... 2 Sandvine s Web Browsing QoE Metric... 3 Maintaining a Web Page Library...
More informationCross Validation. Dr. Thomas Jensen Expedia.com
Cross Validation Dr. Thomas Jensen Expedia.com About Me PhD from ETH Used to be a statistician at Link, now Senior Business Analyst at Expedia Manage a database with 720,000 Hotels that are not on contract
More informationPrometheus: Toward Quality-of-Experience Estimation for Mobile Apps from Passive Network Measurements
Prometheus: Toward Quality-of-Experience Estimation for Mobile Apps from Passive Network Measurements Vaneet Aggarwal, Emir Halepovic, Jeffrey Pang, Shobha Venkataraman, He Yan AT&T Labs - Research 1 AT&T
More informationDelivering Network Performance and Capacity. The most important thing we build is trust
Delivering Network Performance and Capacity The most important thing we build is trust The Ultimate in Real-life Network Perfomance Testing 1 The TM500 Family the most comprehensive 3GPP performance and
More informationMonitoring the Real End User Experience
An AppDynamics Business White Paper HOW MUCH REVENUE DOES IT GENERATE? Monitoring the Real End User Experience Web application performance is fundamentally associated in the mind of the end user; with
More informationSDN-based Application-Aware Networking on the Example of YouTube Video Streaming
Institute of Computer Science Chair of Communication Networks Prof. Dr.-Ing. P. Tran-Gia SDN-based Application-Aware Networking on the Example of YouTube Video Streaming www3.informatik.uni-wuerzburg.de
More informationPredicting Flight Delays
Predicting Flight Delays Dieterich Lawson jdlawson@stanford.edu William Castillo will.castillo@stanford.edu Introduction Every year approximately 20% of airline flights are delayed or cancelled, costing
More informationPredict the Popularity of YouTube Videos Using Early View Data
000 001 002 003 004 005 006 007 008 009 010 011 012 013 014 015 016 017 018 019 020 021 022 023 024 025 026 027 028 029 030 031 032 033 034 035 036 037 038 039 040 041 042 043 044 045 046 047 048 049 050
More informationClicklab Click Fraud Detection Frequently Asked Questions
Clicklab Click Fraud Detection Frequently Asked Questions Clicklab, LLC 1616 Anderson Road McLean, VA 22102 www.clicklab.com Toll-free 888-841-3342 Fax 202-318-1408 Email sales@clicklab.com Table of Contents
More informationLarge Scale Data Analytics of User Behavior for Improving Content Delivery
Large Scale Data Analytics of User Behavior for Improving Content Delivery Athula Balachandran CMU-CS-14-142 December 2014 School of Computer Science Computer Science Department Carnegie Mellon University
More informationTesting & Assuring Mobile End User Experience Before Production. Neotys
Testing & Assuring Mobile End User Experience Before Production Neotys Agenda Introduction The challenges Best practices NeoLoad mobile capabilities Mobile devices are used more and more At Home In 2014,
More informationLab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace
Lab Exercise 802.11 Objective To explore the physical layer, link layer, and management functions of 802.11. It is widely used to wireless connect mobile devices to the Internet, and covered in 4.4 of
More informationMeasuring Web Browsing Quality of Experience: Requirements for Gaining Meaningful Insight
Measuring Web Browsing Quality of Experience: Requirements for Gaining Meaningful Insight An Industry Whitepaper Contents Executive Summary... 1 Introduction to Web Browsing QoE... 2 Designing a Solution...
More informationResults-Oriented Application Acceleration with FastView Because Every Second Counts Whitepaper
Results-Oriented Application Acceleration with FastView Because Every Second Counts Whitepaper Table of Contents Executive Summary...3 Why Website Performance Matters...3 What Affects Website Performance...5
More informationWeb Analytics Definitions Approved August 16, 2007
Web Analytics Definitions Approved August 16, 2007 Web Analytics Association 2300 M Street, Suite 800 Washington DC 20037 standards@webanalyticsassociation.org 1-800-349-1070 Licensed under a Creative
More informationData Mining III: Numeric Estimation
Data Mining III: Numeric Estimation Computer Science 105 Boston University David G. Sullivan, Ph.D. Review: Numeric Estimation Numeric estimation is like classification learning. it involves learning a
More informationContent Delivery Networks
Content Delivery Networks Terena 2000 ftp://ftpeng.cisco.com/sgai/t2000cdn.pdf Silvano Gai Cisco Systems, USA Politecnico di Torino, IT sgai@cisco.com Terena 2000 1 Agenda What are Content Delivery Networks?
More information1 Introduction to mobile telecommunications
1 Introduction to mobile telecommunications Mobile phones were first introduced in the early 1980s. In the succeeding years, the underlying technology has gone through three phases, known as generations.
More informationApplication Performance Monitoring (APM) Technical Whitepaper
Application Performance Monitoring (APM) Technical Whitepaper Table of Contents Introduction... 3 Detect Application Performance Issues Before Your Customer Does... 3 Challenge of IT Manager... 3 Best
More information1 Which of the following questions can be answered using the goal flow report?
1 Which of the following questions can be answered using the goal flow report? [A] Are there a lot of unexpected exits from a step in the middle of my conversion funnel? [B] Do visitors usually start my
More informationCleaning Encrypted Traffic
Optenet Documentation Cleaning Encrypted Traffic Troubleshooting Guide iii Version History Doc Version Product Date Summary of Changes V6 OST-6.4.300 01/02/2015 English editing Optenet Documentation
More informationCLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA
CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA Professor Yang Xiang Network Security and Computing Laboratory (NSCLab) School of Information Technology Deakin University, Melbourne, Australia http://anss.org.au/nsclab
More informationSite Survey and RF Design Validation
CHAPTER 8 Site Survey Introduction In the realm of wireless networking, careful planning is essential to ensure that your wireless network performs in a manner that is consistent with Cisco s design and
More informationHow To Optimize Your Website With Radware Fastview
FastView Radware s End-to-End Acceleration Technology Technology Overview Whitepaper Table of Contents Executive Summary... 3 Performance Matters... 4 The Business Impact of Fast Web Sites... 4 Acceleration
More informationSegmented monitoring of 100Gbps data containing CDN video. Telesoft White Papers
Segmented monitoring of 100Gbps data containing CDN video Telesoft White Papers Steve Patton Senior Product Manager 23 rd April 2015 IP Video The Challenge The growth in internet traffic caused by increasing
More informationSocial Media Mining. Data Mining Essentials
Introduction Data production rate has been increased dramatically (Big Data) and we are able store much more data than before E.g., purchase data, social media data, mobile phone data Businesses and customers
More informationApp coverage. ericsson White paper Uen 284 23-3212 Rev B August 2015
ericsson White paper Uen 284 23-3212 Rev B August 2015 App coverage effectively relating network performance to user experience Mobile broadband networks, smart devices and apps bring significant benefits
More informationEmpirix xcentrix Mobile Broadband Analysis Package
Datasheet Empirix xcentrix Mobile Broadband Analysis Package Predict: Timely intelligence and expert analysis reveals innovative business opportunities and enables smarter decision-making across the organization
More informationThe IVE also supports using the following additional features with CA certificates:
1 A CA certificate allows you to control access to realms, roles, and resource policies based on certificates or certificate attributes. For example, you may specify that users must present a valid client-side
More informationhttp://alice.teaparty.wonderland.com:23054/dormouse/bio.htm
Client/Server paradigm As we know, the World Wide Web is accessed thru the use of a Web Browser, more technically known as a Web Client. 1 A Web Client makes requests of a Web Server 2, which is software
More informationThe 2012 State of Web and Social Media Analytics in Higher Education
The 2012 State of Web and Social Media Analytics in Higher Education Survey Results Executive Summary by Higher Ed Experts June 2012 Want to learn how to use Web Analytics in Higher Ed? Check out our 4-week
More informationUnderstanding Mobile Terminated Call Failures
Understanding Mobile Terminated Call Failures 80-W2357-1, Rev A Qualcomm Incorporated 5775 Morehouse Drive San Diego, CA 92121-1714 U.S.A. Copyright 2012 Qualcomm Incorporated. All rights reserved. Not
More informationUser Authentication/Identification From Web Browsing Behavior
User Authentication/Identification From Web Browsing Behavior US Naval Research Laboratory PI: Myriam Abramson, Code 5584 Shantanu Gore, SEAP Student, Code 5584 David Aha, Code 5514 Steve Russell, Code
More informationDataSheet. A complete view of the customer. What is Accanto s icem?
DataSheet icem: A complete view of the customer To overcome the challenges of decreasing margins from voice services, whilst catering for high cost network investments due to high data consumption, Operators
More informationWhy Mobile Performance is Hard
Matt Welsh mdw@google.com Google, Inc. http://www.flickr.com/photos/nao-cha/2660459899/ Why Mobile Performance is Hard In a nutshell: Despite 20 years of research and engineering, mobile performance still
More informationGet the best performance from your LTE Network with MOBIPASS
Get the best performance from your LTE Network with MOBIPASS The most powerful, user friendly and scalable enodeb test tools family for Network Equipement Manufacturers and Mobile Network Operators Network
More informationMeraki as Cisco Cloud Services Manage your network Where ever you are!
Meraki as Cisco Cloud Services Manage your network Where ever you are! Marketing/Technical description for services Scope of the Service Cloud services can deliver big technology benefits to midsized and
More informationCrowdsourcing mobile networks from experiment
Crowdsourcing mobile networks from the experiment Katia Jaffrès-Runser University of Toulouse, INPT-ENSEEIHT, IRIT lab, IRT Team Ecole des sciences avancées de Luchon Networks and Data Mining, Session
More informationNetwork Forensics Network Traffic Analysis
Copyright: The development of this document is funded by Higher Education of Academy. Permission is granted to copy, distribute and /or modify this document under a license compliant with the Creative
More information131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10
1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom
More informationUsing Big Data for More Dependability: A Cellular Network Tale
Using Big Data for More Dependability: A Cellular Network Tale ABSTRACT Nawanol Theera-Ampornpunt Purdue University ntheeraa@purdue.edu Kaustubh R. Joshi AT&T Labs Research kaustubh@research.att.com There
More informationMicrosoft Azure Machine learning Algorithms
Microsoft Azure Machine learning Algorithms Tomaž KAŠTRUN @tomaz_tsql Tomaz.kastrun@gmail.com http://tomaztsql.wordpress.com Our Sponsors Speaker info https://tomaztsql.wordpress.com Agenda Focus on explanation
More informationPerformance Comparison of low-latency Anonymisation Services from a User Perspective
Performance Comparison of low-latency Anonymisation Services from a User Perspective Rolf Wendolsky Hannes Federrath Department of Business Informatics University of Regensburg 7th Workshop on Privacy
More informationAlcatel-Lucent 9360 Small Cell Solution for the Home. Delivering big gains all around
Alcatel-Lucent 9360 Small Cell Solution for the Home Delivering big gains all around The Alcatel-Lucent 9360 Small Cell solution for the home (9360 SCH) cost-effectively extends W-CDMA capacity and coverage
More informationPrivacy Policy EMA Online
Privacy Policy EMA Online Thank you for visiting our Privacy Policy. We are committed to respecting the privacy rights of the users of www.emaonline.com ( Website ). We created this privacy policy (the
More informationLARGE-SCALE INTERNET MEASUREMENTS FOR DIAGNOSTICS AND PUBLIC POLICY. Henning Schulzrinne (+ Walter Johnston & James Miller) FCC & Columbia University
1 LARGE-SCALE INTERNET MEASUREMENTS FOR DIAGNOSTICS AND PUBLIC POLICY Henning Schulzrinne (+ Walter Johnston & James Miller) FCC & Columbia University 2 Overview Quick overview What does MBA measure? Can
More informationChapter 6. The stacking ensemble approach
82 This chapter proposes the stacking ensemble approach for combining different data mining classifiers to get better performance. Other combination techniques like voting, bagging etc are also described
More informationInternational Journal of Computer Trends and Technology (IJCTT) volume 4 Issue 8 August 2013
A Short-Term Traffic Prediction On A Distributed Network Using Multiple Regression Equation Ms.Sharmi.S 1 Research Scholar, MS University,Thirunelvelli Dr.M.Punithavalli Director, SREC,Coimbatore. Abstract:
More informationHow To Use Icem
DataSheet icem: A complete view of the customer To overcome the challenges of decreasing margins from voice services, whilst catering for high cost network investments due to high data consumption, operators
More informationCYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION
CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION MATIJA STEVANOVIC PhD Student JENS MYRUP PEDERSEN Associate Professor Department of Electronic Systems Aalborg University,
More informationDigital media glossary
A Ad banner A graphic message or other media used as an advertisement. Ad impression An ad which is served to a user s browser. Ad impression ratio Click-throughs divided by ad impressions. B Banner A
More informationNetView 360 Product Description
NetView 360 Product Description Heterogeneous network (HetNet) planning is a specialized process that should not be thought of as adaptation of the traditional macro cell planning process. The new approach
More informationHeterogeneous Networks: a Big Data Perspective
Heterogeneous Networks: a Big Data Perspective Arash Behboodi October 26, 2015 Institute for Theoretical Information Technology Prof. Dr. Rudolf Mathar RWTH Aachen University Wireless Communication: History
More informationComputer Networking LAB 2 HTTP
Computer Networking LAB 2 HTTP 1 OBJECTIVES The basic GET/response interaction HTTP message formats Retrieving large HTML files Retrieving HTML files with embedded objects HTTP authentication and security
More informationProtection, Usability and Improvements in Reflected XSS Filters
Protection, Usability and Improvements in Reflected XSS Filters Riccardo Pelizzi System Security Lab Department of Computer Science Stony Brook University May 2, 2012 1 / 19 Riccardo Pelizzi Improvements
More informationDetecting client-side e-banking fraud using a heuristic model
Detecting client-side e-banking fraud using a heuristic model Tim Timmermans tim.timmermans@os3.nl Jurgen Kloosterman jurgen.kloosterman@os3.nl University of Amsterdam July 4, 2013 Tim Timmermans, Jurgen
More informationNumerical Algorithms Group
Title: Summary: Using the Component Approach to Craft Customized Data Mining Solutions One definition of data mining is the non-trivial extraction of implicit, previously unknown and potentially useful
More information3GPP Technologies: Load Balancing Algorithm and InterNetworking
2014 4th International Conference on Artificial Intelligence with Applications in Engineering and Technology 3GPP Technologies: Load Balancing Algorithm and InterNetworking Belal Abuhaija Faculty of Computers
More informationMulti-service Load Balancing in a Heterogeneous Network with Vertical Handover
1 Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover Jie Xu, Member, IEEE, Yuming Jiang, Member, IEEE, and Andrew Perkis, Member, IEEE Abstract In this paper we investigate
More informationBeating the MLB Moneyline
Beating the MLB Moneyline Leland Chen llxchen@stanford.edu Andrew He andu@stanford.edu 1 Abstract Sports forecasting is a challenging task that has similarities to stock market prediction, requiring time-series
More informationAnalysis of QoS parameters of VOIP calls over Wireless Local Area Networks
Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks Ayman Wazwaz, Computer Engineering Department, Palestine Polytechnic University, Hebron, Palestine, aymanw@ppu.edu Duaa sweity
More informationQuality of Service (QoS) and Quality of Experience (QoE) VoiceCon Fall 2008
Quality of Service (QoS) and Quality of Experience (QoE) VoiceCon Fall 2008 John Bartlett NetForecast, Inc. john@netforecast.com www.netforecast.com VoIP Deployment Realities VoIP is not just another application
More informationUsing Big Data for More Dependability: A Cellular Network Tale
Using Big Data for More Dependability: A Cellular Network Tale Nawanol Theera-Ampornpunt, Saurabh Bagchi Purdue University Kaustubh Joshi, Rajesh Panta AT&T Labs Research Abstract There are many large
More informationHow To Measure Quality Of Service On An Hpla (Html) Website
Relationship between Quality-of-Service and Quality-of-Experience for Public Internet Service Stas Khirman (stask@narus.com) and Peter Henriksen (peterh@narus.com) Narus Inc. (http://www.narus.com) 395
More informationData Mining in CRM & Direct Marketing. Jun Du The University of Western Ontario jdu43@uwo.ca
Data Mining in CRM & Direct Marketing Jun Du The University of Western Ontario jdu43@uwo.ca Outline Why CRM & Marketing Goals in CRM & Marketing Models and Methodologies Case Study: Response Model Case
More informationWebmail Using the Hush Encryption Engine
Webmail Using the Hush Encryption Engine Introduction...2 Terms in this Document...2 Requirements...3 Architecture...3 Authentication...4 The Role of the Session...4 Steps...5 Private Key Retrieval...5
More informationGO Software Inc. Wireless Credit Card Processing with PCCharge
GO Software Inc. Wireless Credit Card Processing with PCCharge PCCharge will wirelessly connect to credit card processors and automatically process credit cards wirelessly if properly set up to run with
More informationTrends and Differences in Connection-behavior within Classes of Internet Backbone Traffic
MonNet a project for network and traffic monitoring Trends and Differences in Connection-behavior within Classes of Internet Backbone Traffic Wolfgang John, Sven Tafvelin and Tomas Olovsson Department
More informationAdvanced Administration for Citrix NetScaler 9.0 Platinum Edition
Advanced Administration for Citrix NetScaler 9.0 Platinum Edition Course Length: 5 Days Course Code: CNS-300 Course Description This course provides the foundation to manage, configure and monitor advanced
More informationRake: Semantics Assisted Networkbased Tracing Framework
Rake: Semantics Assisted Networkbased Tracing Framework Yan Chen Lab for Internet and Security Technology (LIST) Northwestern Univ. Joint work with Yao Zhao, Yinzhi Cao, Anup Goyal (NU), and Ming Zhang
More informationRemoving Web Spam Links from Search Engine Results
Removing Web Spam Links from Search Engine Results Manuel EGELE pizzaman@iseclab.org, 1 Overview Search Engine Optimization and definition of web spam Motivation Approach Inferring importance of features
More informationComparison of machine learning methods for intelligent tutoring systems
Comparison of machine learning methods for intelligent tutoring systems Wilhelmiina Hämäläinen 1 and Mikko Vinni 1 Department of Computer Science, University of Joensuu, P.O. Box 111, FI-80101 Joensuu
More informationManaging Virtual Servers
CHAPTER 4 Content Switching Module Device Manager (CVDM-CSM) displays details of existing virtual servers and enables users to perform detailed tasks that include creating or deleting virtual servers,
More informationCNS-301-3I ~ Citrix NetScaler 11 Advanced Implementation
CNS-301-3I ~ Citrix NetScaler 11 Advanced Implementation11 vanced Implementation Overview Designed for students with previous NetScaler experience, this course is best suited for individuals who will be
More informationThe Evolution of Application Acceleration:
WHITE PAPER The Evolution of Application Acceleration: From Server Load Balancers to Application Delivery Controllers www.crescendonetworks.com Corporate Headquarters 6 Yoni Netanyahu Street Or-Yehuda
More informationUsing multiple models: Bagging, Boosting, Ensembles, Forests
Using multiple models: Bagging, Boosting, Ensembles, Forests Bagging Combining predictions from multiple models Different models obtained from bootstrap samples of training data Average predictions or
More informationFlow Analysis Versus Packet Analysis. What Should You Choose?
Flow Analysis Versus Packet Analysis. What Should You Choose? www.netfort.com Flow analysis can help to determine traffic statistics overall, but it falls short when you need to analyse a specific conversation
More informationYottaa Site Optimizer Guide
Yottaa Site Optimizer Guide The Yottaa Site Optimizer automatically accelerates web sites and mobile apps, reducing page load times and improving your visitors ability to interact with every page on your
More informationTamoSoft Throughput Test
TAKE CONTROL IT'S YOUR SECURITY TAMOSOFT df TamoSoft Throughput Test Help Documentation Version 1.0 Copyright 2011-2014 TamoSoft Contents Contents... 2 Introduction... 3 Overview... 3 System Requirements...
More informationD. SamKnows Methodology 20 Each deployed Whitebox performs the following tests: Primary measure(s)
v. Test Node Selection Having a geographically diverse set of test nodes would be of little use if the Whiteboxes running the test did not have a suitable mechanism to determine which node was the best
More informationTechnical Brief: Dynamic Number Insertion
Technical Brief: Dynamic Number Insertion Feature Definition Dynamic Number Insertion (DNI) by Convirza for Call Quality Monitoring allows users to display a different call tracking phone number on their
More informationData Mining Methods: Applications for Institutional Research
Data Mining Methods: Applications for Institutional Research Nora Galambos, PhD Office of Institutional Research, Planning & Effectiveness Stony Brook University NEAIR Annual Conference Philadelphia 2014
More informationWeb Crawlers Detection
American University In Cairo Seminar Report Web Crawlers Detection Author: Yomna ElRashidy Supervisor: Ahmed Rafea A report submitted in fulfilment of the requirements of Seminar 1 course for the degree
More informationExtraHop and AppDynamics Deployment Guide
ExtraHop and AppDynamics Deployment Guide This guide describes how to use ExtraHop and AppDynamics to provide real-time, per-user transaction tracing across the entire application delivery chain. ExtraHop
More informationNetgator: Malware Detection Using Program Interactive Challenges. Brian Schulte, Haris Andrianakis, Kun Sun, and Angelos Stavrou
Netgator: Malware Detection Using Program Interactive Challenges Brian Schulte, Haris Andrianakis, Kun Sun, and Angelos Stavrou Intro Increase of stealthy malware in enterprises Obfuscation, polymorphic
More informationWeb Traffic Capture. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com
Web Traffic Capture Capture your web traffic, filtered and transformed, ready for your applications without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite
More informationA First Look at Cellular Network Performance during Crowded Events
A First Look at Cellular Network Performance during Crowded s M. Zubair Shafiq, Lusheng Ji, Alex X. Liu, Jeffrey Pang, Shobha Venkataraman, Jia Wang Department of Computer Science and Engineering, Michigan
More informationResponsive Web Design: A Three-Screen Study in Site Performance
1 June 17, 2014 Responsive Web Design: A Three-Screen Study in Site Performance Ken Harker Senior Consultant ken.harker@keynote.com Keynote Consulting Mobile Research Summit: Data & Insights 2014 June
More informationDEPLOYMENT GUIDE Version 2.1. Deploying F5 with Microsoft SharePoint 2010
DEPLOYMENT GUIDE Version 2.1 Deploying F5 with Microsoft SharePoint 2010 Table of Contents Table of Contents Introducing the F5 Deployment Guide for Microsoft SharePoint 2010 Prerequisites and configuration
More informationHow performance metrics depend on the traffic demand in large cellular networks
How performance metrics depend on the traffic demand in large cellular networks B. B laszczyszyn (Inria/ENS) and M. K. Karray (Orange) Based on joint works [1, 2, 3] with M. Jovanovic (Orange) Presented
More informationGlobal Server Load Balancing
White Paper Overview Many enterprises attempt to scale Web and network capacity by deploying additional servers and increased infrastructure at a single location, but centralized architectures are subject
More informationJetBlue Airways Stock Price Analysis and Prediction
JetBlue Airways Stock Price Analysis and Prediction Team Member: Lulu Liu, Jiaojiao Liu DSO530 Final Project JETBLUE AIRWAYS STOCK PRICE ANALYSIS AND PREDICTION 1 Motivation Started in February 2000, JetBlue
More informationSentiment analysis using emoticons
Sentiment analysis using emoticons Royden Kayhan Lewis Moharreri Steven Royden Ware Lewis Kayhan Steven Moharreri Ware Department of Computer Science, Ohio State University Problem definition Our aim was
More informationHow Voice Calls Affect Data in Operational LTE Networks
How Voice Calls Affect Data in Operational LTE Networks Guan-Hua Tu*, Chunyi Peng+, Hongyi Wang*, Chi-Yu Li*, Songwu Lu* *University of California, Los Angeles, US +Ohio State University, Columbus, US
More informationApplication Detection
The following topics describe Firepower System application detection : Overview:, page 1 Custom Application Detectors, page 7 Viewing or Downloading Detector Details, page 15 Sorting the Detector List,
More informationUnderstanding Your Customer Journey by Extending Adobe Analytics with Big Data
SOLUTION BRIEF Understanding Your Customer Journey by Extending Adobe Analytics with Big Data Business Challenge Today s digital marketing teams are overwhelmed by the volume and variety of customer interaction
More informationNetwork Optimization based on performance and capacity criteria
Network Optimization based on performance and capacity criteria Kimmo Aaltonen Wireless Development Manager 2011 EXFO Inc. All rights reserved. 1 I fully agree with this guy 2010 2012 EXFO Inc. All rights
More informationALM 271 From End-User Experience Monitoring to Management Dashboards and Reporting Stefan Lahr, SAP Active Global Support September, 2011
ALM 271 From End-User Experience Monitoring to Management Dashboards and Reporting Stefan Lahr, SAP Active Global Support September, 2011 Disclaimer This presentation outlines our general product direction
More informationTowards a metric for on-page search engine optimization
Central Page 194 of 344 Towards a metric for on-page search engine optimization Goran Matošević Faculty of Economics and Tourism Dr. Mijo Mirković University of Pula Preradovićeva 1/1, 52100 Pula, Croatia
More information