Results 21 to 30 of about 5,314 (170)
Ideal and Predictable Hit Ratio for Matrix Transposition in Data Caches
Matrix transposition is a fundamental operation, but it may present a very low and hardly predictable data cache hit ratio for large matrices. Safe (worst-case) hit ratio predictability is required in real-time systems.
Alba Pedro-Zapater +4 more
doaj +1 more source
This paper adequately summarizes and systematically classifies the studies related to the SD‐ICN network, which provides a forward‐looking review and development direction for scholars and engineers. Abstract As a promising architecture of next‐generation network, software defined‐information centric network (SD‐ICN) inherits the advantages of software
Zhengyang Ai +5 more
wiley +1 more source
Cache Oblivious Matrix Multiplication Algorithm using Sequential Access Processing
Parmeshwar S. Korde, Praskash B. Khanale
openalex +2 more sources
Euclidean affine functions and their application to calendar algorithms
Abstract In everyday life, dates are specified in terms of year, month and day, but this is not how digital devices represent them. Such devices continuously count elapsed days since a certain reference date, usually 1 January 1970. Accordingly, the date exactly one year after this reference is 1 January 1971 and digital devices represent it as 365 ...
Cassio Neri, Lorenz Schneider
wiley +1 more source
Complex queries over decentralised systems for geodata retrieval
Abstract Decentralised systems have been proved to be quite effective to allow for trusted and accountable data sharing, without the need to resort to a centralised party that collects all the information. While complete decentralisation provides important advantages in terms of data sovereignty, absence of bottlenecks and reliability, it also adds ...
Mirko Zichichi +3 more
wiley +1 more source
Software‐defined networking (SDN) brings an innovative approach to networking by adopting a flow‐centric model and removing networking decisions from the data plane to provide them centrally from the control plane. A single centralized controller is used in a traditional SDN design.
Muhammed Nura Yusuf +4 more
wiley +1 more source
Secure contact tracing platform from simplest private set intersection cardinality
Abstract Contact tracing is an essential tool for controlling the spread of disease through human populations. However, existing contact tracing applications are either vulnerable to privacy and security attacks or heavy bandwidth/computational requirements on the client's devices.
Jiahui Gao, Chetan Surana, Ni Trieu
wiley +1 more source
A Fast Monotone Discretization of the Rotating Shallow Water Equations
Abstract This paper presents a new discretization of the rotating shallow water equations and a set of decisions, ranging from a simplification of the continuous equations down to the implementation level, yielding a code that is fast and accurate. Accuracy is reached by using WENO reconstructions on the mass flux and on the nonlinear Coriolis term ...
Guillaume Roullet, Tugdual Gaillard
wiley +1 more source
Thermal Storage for the Analysis of Hybrid Energy Systems Based on Geothermal and Solar Power
Thermal degradation of geothermal energy occurs even during the duration of geothermal energy facilities. The enormity and efficiency of thermal energy available for electric transformation, as well as plant performance and power production, are both affected by the decrease in geofluid heat. Additionally, due to the generally increased turbine exhaust
K. U. Aravind +8 more
wiley +1 more source
Recently, IoT devices have become the targets of large‐scale cyberattacks, and their security issues have been increasingly serious. However, due to the limited memory and battery power of IoT devices, it is hardly possible to install traditional security software, such as antivirus software for security defense.
Jin Wang +7 more
wiley +1 more source

