Results 11 to 20 of about 589,245 (147)

RRF‐IPS: A Real‐Time Reputation‐Based Intrusion Prevention System

open access: yesEngineering Reports
With the rapid development of technologies such as cloud computing and the Internet of Things, organizations face the thorny reality that network attacks are becoming increasingly diverse, covert, and intelligent.
Zhenghao Qian   +7 more
doaj   +2 more sources

Bandwidth Allocation Games [PDF]

open access: yesarXiv.org, 2022
Internet providers often offer data plans that, for each user's monthly billing cycle, guarantee a fixed amount of data at high rates until a byte threshold is reached, at which point the user's data rate is throttled to a lower rate for the remainder of
Niloofar Bayat, V. Misra, D. Rubenstein
semanticscholar   +1 more source

CLIP: Load Criticality based Data Prefetching for Bandwidth-constrained Many-core Systems

open access: yesMicro, 2023
Hardware prefetching is a latency-hiding technique that hides the costly off-chip DRAM accesses. However, state-of-the-art prefetchers fail to deliver performance improvement in the case of many-core systems with constrained DRAM bandwidth.
Biswabandan Panda
semanticscholar   +1 more source

The Techniques in Enhancing Bandwidth Load Balancing QoS at Local Area Network: A Review Paper

open access: yesInternational Journal on Cybernetics & Informatics, 2023
Bandwidth load balancing is a critical technique for improving the quality of service (QoS) in local area networks (LANs). Insufficient load balancing and QoS utilization can lead to network congestion, reduced performance, latency, packet loss, and an ...
M. Al-Batahari   +2 more
semanticscholar   +1 more source

From Cooperative Scans to Predictive Buffer Management [PDF]

open access: yes, 2012
In analytical applications, database systems often need to sustain workloads with multiple concurrent scans hitting the same table. The Cooperative Scans (CScans) framework, which introduces an Active Buffer Manager (ABM) component into the database ...
Chen C.-M.   +14 more
core   +5 more sources

DeepPicar: A Low-cost Deep Neural Network-based Autonomous Car

open access: yes, 2018
We present DeepPicar, a low-cost deep neural network based autonomous car platform. DeepPicar is a small scale replication of a real self-driving car called DAVE-2 by NVIDIA.
Bechtel, Michael G.   +3 more
core   +1 more source

Extensible Heterogeneous Collaborative Perception in Autonomous Vehicles with Codebook Compression

open access: yesRobotics
Collaborative perception can mitigate occlusion and range limitations in autonomous driving, but deployment remains constrained by strict bandwidth budgets and heterogeneous agent stacks.
Babak Ebrahimi Soorchaei   +2 more
doaj   +1 more source

Energy-efficient traffic engineering [PDF]

open access: yes, 2012
The energy consumption in telecommunication networks is expected to grow considerably, especially in core networks. In this chapter, optimization of energy consumption is approached from two directions.
DC Kilper   +5 more
core   +2 more sources

Internet Censorship: An Integrative Review of Technologies Employed to Limit Access to the Internet, Monitor User Actions, and their Effects on Culture [PDF]

open access: yes, 2020
The following conducts an integrative review of the current state of Internet Censorship in China, Iran, and Russia, highlights common circumvention technologies (CTs), and analyzes the effects Internet Censorship has on cultures.
Hyland, Joe
core   +1 more source

10 Gbit/s bit interleaving CDR for low-power PON [PDF]

open access: yes, 2012
A novel, low power, downstream clock and data recovery (CDR)- decimator architecture is proposed for next generation, energy efficient 10 Gbit/s optical network units (ONUs).
Chow, Hungkei   +7 more
core   +2 more sources

Home - About - Disclaimer - Privacy