Quantcast
Channel: Phys.org news tagged with:network traffic
Browsing all 57 articles
Browse latest View live

Data exchange between vehicles and the road network increases traffic safety

The just-completed international Celtic Plus CoMoSeF project involved the development of data exchange between vehicles and infrastructure. The resulting communication system provides drivers with real...

View Article


Sydney makes its mark with electronic paper traffic signs

Visionect, which is in the business of helping companies build electronic paper display products, announced that Sydney has launched e-paper traffic signs. The traffic signage integrates displays from...

View Article


What's the best way to charge millions of electric vehicles at once?

(Phys.org)—About 350,000 plug-in electric vehicles (EVs) have been sold in the US from 2008—when they first entered the market—to mid-2015. Although EVs still represent a small fraction of the...

View Article

New traffic app and disaster prevention technology road tested

A new smartphone traffic app tested by citizens in Dublin, Ireland allows users to give feedback on traffic incidents, enabling traffic management centres to respond quicker when collisions and other...

View Article

TD-LTE breakthroughs showcased at Mobile World Congress 2013

Nokia Siemens Networks is highlighting TD-LTE innovation at Mobile World Congress 2013 in Barcelona. This includes a demonstration of data traffic offloading between TD-LTE and FDD-LTE using the...

View Article


3Qs: The rules of cyber-engagement

The Obama administration is close to approving the nation's first set of rules for how the military can defend or retaliate against a major cyberattack, according to a report last month in The New York...

View Article

Researchers develop system to control information leaks from smartphone apps

If you've used the fitness-tracking app Map MyRun, there's a chance that your password has been leaked.

View Article

Vuvuzela, a next-generation anonymity tool that protects users by adding NOISE

Cryptography is the science of keeping secrets, with encryption algorithms and methods such as public key encryption the gold standard. Despite widespread usage and heavy scrutiny, these ciphers remain...

View Article


Delivering the Internet of the future—at the speed of light and open sourced

New research has found, for the first time, a scientific solution that enables future internet infrastructure to become completely open and programmable while carrying internet traffic at the speed of...

View Article


Researchers discover new steps in the escalating cat-and-mouse game of...

Researchers have found that the "Great Firewall" technology that controls internet traffic entering and leaving China is not merely an apparatus that statically blocks traffic. It also actively sends...

View Article

Moving mobile communication onto the cloud

The EU MOBILE CLOUD NETWORKING project, which was officially completed at the end of April 2016, has effectively integrated domains, cloud computing services and mobile networks in order to provide the...

View Article

Thorny technical questions remain for net neutrality

Federal rules mandating network neutrality – the concept that all internet traffic should be treated equally – were upheld recently by the D.C. Circuit Court of Appeals. The decision was hailed as a...

View Article

CyLab researchers create network traffic visualization tool to help thwart...

Last month, tens of websites including Amazon, Netflix and others fell victim to one of the largest distributed denial of service (DDoS) attacks in history, temporarily crashing under the weight of...

View Article


Calculating where America should invest in its transportation and...

The American economy is underpinned by networks. Road networks carry traffic and freight; the internet and telecommunications networks carry our voices and digital information; the electricity grid is...

View Article

Network traffic provides early indication of malware infection

By analyzing network traffic going to suspicious domains, security administrators could detect malware infections weeks or even months before they're able to capture a sample of the invading malware, a...

View Article


Research identifies methods to protect against online privacy attacks

When Congress voted in March to reverse rules intended to protect Internet users' privacy, many people began looking for ways to keep their online activity private. One of the most popular and...

View Article

Creating a high-speed internet lane for emergency situations

During large disasters, like hurricanes, wildfires and terrorist attacks, people want emergency responders to arrive quickly and help people deal with the crisis. In order to do their best, police,...

View Article

Browsing all 57 articles
Browse latest View live