{"id":"https://openalex.org/W2724962741","doi":"https://doi.org/10.1109/pacrim.2017.8121903","title":"Enhanced congestion control method for servers and network lines with DPI technology","display_name":"Enhanced congestion control method for servers and network lines with DPI technology","publication_year":2017,"publication_date":"2017-08-01","ids":{"openalex":"https://openalex.org/W2724962741","doi":"https://doi.org/10.1109/pacrim.2017.8121903","mag":"2724962741"},"language":"en","primary_location":{"id":"doi:10.1109/pacrim.2017.8121903","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pacrim.2017.8121903","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032312518","display_name":"S. Kato","orcid":"https://orcid.org/0009-0002-2508-8128"},"institutions":[{"id":"https://openalex.org/I6030618","display_name":"Seikei University","ror":"https://ror.org/03ptaj492","country_code":"JP","type":"education","lineage":["https://openalex.org/I6030618"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Shinya Kato","raw_affiliation_strings":["Seikei University, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Seikei University, Tokyo, Japan","institution_ids":["https://openalex.org/I6030618"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058922376","display_name":"Kenichiro Hida","orcid":null},"institutions":[{"id":"https://openalex.org/I6030618","display_name":"Seikei University","ror":"https://ror.org/03ptaj492","country_code":"JP","type":"education","lineage":["https://openalex.org/I6030618"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Kenichiro Hida","raw_affiliation_strings":["Seikei University, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Seikei University, Tokyo, Japan","institution_ids":["https://openalex.org/I6030618"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111744122","display_name":"Shin-ichi Kuribayashi","orcid":null},"institutions":[{"id":"https://openalex.org/I6030618","display_name":"Seikei University","ror":"https://ror.org/03ptaj492","country_code":"JP","type":"education","lineage":["https://openalex.org/I6030618"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Shin-ichi Kuribayashi","raw_affiliation_strings":["Seikei University, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Seikei University, Tokyo, Japan","institution_ids":["https://openalex.org/I6030618"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5032312518"],"corresponding_institution_ids":["https://openalex.org/I6030618"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.07162331,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"116","issue":"507","first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.8536181449890137},{"id":"https://openalex.org/keywords/network-congestion","display_name":"Network congestion","score":0.773703932762146},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7457860708236694},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7067657113075256},{"id":"https://openalex.org/keywords/deep-packet-inspection","display_name":"Deep packet inspection","score":0.5837153196334839},{"id":"https://openalex.org/keywords/bandwidth","display_name":"Bandwidth (computing)","score":0.4666334092617035},{"id":"https://openalex.org/keywords/packet-loss","display_name":"Packet loss","score":0.46056658029556274},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.42972663044929504}],"concepts":[{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.8536181449890137},{"id":"https://openalex.org/C195563490","wikidata":"https://www.wikidata.org/wiki/Q180368","display_name":"Network congestion","level":3,"score":0.773703932762146},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7457860708236694},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7067657113075256},{"id":"https://openalex.org/C204679922","wikidata":"https://www.wikidata.org/wiki/Q734252","display_name":"Deep packet inspection","level":3,"score":0.5837153196334839},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.4666334092617035},{"id":"https://openalex.org/C54108766","wikidata":"https://www.wikidata.org/wiki/Q391064","display_name":"Packet loss","level":3,"score":0.46056658029556274},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.42972663044929504}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/pacrim.2017.8121903","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pacrim.2017.8121903","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM)","raw_type":"proceedings-article"},{"id":"mag:2775000436","is_oa":false,"landing_page_url":"https://www.ieice.org/ken/paper/20170309qbqu/eng/","pdf_url":null,"source":{"id":"https://openalex.org/S4306512848","display_name":"IEICE Technical Report; IEICE Tech. Rep.","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":"IEICE Technical Report; IEICE Tech. Rep.","raw_type":null}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W2062401262","https://openalex.org/W2120948237","https://openalex.org/W2176736326","https://openalex.org/W4234910696"],"related_works":["https://openalex.org/W4226218331","https://openalex.org/W2106906543","https://openalex.org/W2047584981","https://openalex.org/W4381301812","https://openalex.org/W1561385631","https://openalex.org/W2166315921","https://openalex.org/W2071614110","https://openalex.org/W2162566722","https://openalex.org/W2592825886","https://openalex.org/W23565719"],"abstract_inverted_index":{"The":[0,25,151],"use":[1],"of":[2,45,82,182,193],"Deep":[3],"Packet":[4],"Inspection":[5],"(DPI)":[6],"equipment":[7],"in":[8,38,101,168],"a":[9,28,34,39,105,169,204],"network":[10,40,48,180],"could":[11],"simplify":[12],"the":[13,22,73,80,96,109,177,191,194],"conventional":[14],"work":[15],"load":[16],"for":[17,108,112,157,174],"system":[18,202],"management":[19],"and":[20,141,163,171],"accelerate":[21],"control":[23,30],"action.":[24],"authors":[26],"proposed":[27,195],"congestion":[29,57,99,156,162,165,173],"method":[31],"that":[32],"uses":[33],"DPI":[35,84,206],"device":[36],"installed":[37],"to":[41,63,94,103,123,128,133,138,143,148],"estimate":[42],"overload":[43,54],"conditions":[44,111],"servers":[46,65,127],"or":[47,66],"links":[49],"and,":[50],"upon":[51],"detecting":[52],"an":[53,200],"condition,":[55],"resolves":[56],"by":[58,199],"moving":[59],"some":[60,68,88],"virtual":[61,121,130],"machines":[62,122,131],"other":[64],"rerouting":[67],"communication":[69,136,145,184],"flows.":[70],"However,":[71],"since":[72],"previous":[74],"paper":[75,92,152],"was":[76],"focused":[77],"on":[78],"confirming":[79],"effectiveness":[81],"using":[83],"technology,":[85],"it":[86],"assumed":[87],"restrictive":[89],"conditions.":[90],"This":[91],"proposes":[93],"enhance":[95],"existing":[97],"DPI-based":[98],"control,":[100],"order":[102],"select":[104],"solution":[106],"optimal":[107],"current":[110],"cases":[113,158,175],"where":[114,159,176],"there":[115],"are":[116,132,147],"multiple":[117],"candidates":[118],"available":[119],"for:":[120],"be":[124,134,139,149],"moved,":[125,135],"physical":[126],"which":[129,144],"flows":[137,146],"diverted,":[140],"routes":[142],"diverted.":[150],"also":[153],"considers":[154],"server":[155],"computing":[160],"power":[161],"bandwidth":[164],"occur":[166],"simultaneously":[167],"server,":[170],"link":[172],"maximum":[178],"allowable":[179],"delay":[181],"each":[183],"flow":[185],"is":[186,197],"taken":[187],"into":[188],"consideration.":[189],"Finally,":[190],"feasibility":[192],"methods":[196],"demonstrated":[198],"evaluation":[201],"with":[203],"real":[205],"equipment.":[207]},"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
