Results 21 to 30 of about 5,314 (170)

Ideal and Predictable Hit Ratio for Matrix Transposition in Data Caches

open access: yesMathematics, 2020
Matrix transposition is a fundamental operation, but it may present a very low and hardly predictable data cache hit ratio for large matrices. Safe (worst-case) hit ratio predictability is required in real-time systems.
Alba Pedro-Zapater   +4 more
doaj   +1 more source

Survey on the scheme evaluation, opportunities and challenges of software defined‐information centric network

open access: yesIET Communications, Volume 17, Issue 20, Page 2237-2274, December 2023., 2023
This paper adequately summarizes and systematically classifies the studies related to the SD‐ICN network, which provides a forward‐looking review and development direction for scholars and engineers. Abstract As a promising architecture of next‐generation network, software defined‐information centric network (SD‐ICN) inherits the advantages of software
Zhengyang Ai   +5 more
wiley   +1 more source

Cache Oblivious Matrix Multiplication Algorithm using Sequential Access Processing

open access: closedResearch Journal of Information Technology, 2011
Parmeshwar S. Korde, Praskash B. Khanale
openalex   +2 more sources

Euclidean affine functions and their application to calendar algorithms

open access: yesSoftware: Practice and Experience, Volume 53, Issue 4, Page 937-970, April 2023., 2023
Abstract In everyday life, dates are specified in terms of year, month and day, but this is not how digital devices represent them. Such devices continuously count elapsed days since a certain reference date, usually 1 January 1970. Accordingly, the date exactly one year after this reference is 1 January 1971 and digital devices represent it as 365 ...
Cassio Neri, Lorenz Schneider
wiley   +1 more source

Complex queries over decentralised systems for geodata retrieval

open access: yesIET Networks, Volume 12, Issue 2, Page 37-52, March 2023., 2023
Abstract Decentralised systems have been proved to be quite effective to allow for trusted and accountable data sharing, without the need to resort to a centralised party that collects all the information. While complete decentralisation provides important advantages in terms of data sovereignty, absence of bottlenecks and reliability, it also adds ...
Mirko Zichichi   +3 more
wiley   +1 more source

Distributed Controller Placement in Software‐Defined Networks with Consistency and Interoperability Problems

open access: yesJournal of Electrical and Computer Engineering, Volume 2023, Issue 1, 2023., 2023
Software‐defined networking (SDN) brings an innovative approach to networking by adopting a flow‐centric model and removing networking decisions from the data plane to provide them centrally from the control plane. A single centralized controller is used in a traditional SDN design.
Muhammed Nura Yusuf   +4 more
wiley   +1 more source

Secure contact tracing platform from simplest private set intersection cardinality

open access: yesIET Information Security, Volume 16, Issue 5, Page 346-361, September 2022., 2022
Abstract Contact tracing is an essential tool for controlling the spread of disease through human populations. However, existing contact tracing applications are either vulnerable to privacy and security attacks or heavy bandwidth/computational requirements on the client's devices.
Jiahui Gao, Chetan Surana, Ni Trieu
wiley   +1 more source

A Fast Monotone Discretization of the Rotating Shallow Water Equations

open access: yesJournal of Advances in Modeling Earth Systems, Volume 14, Issue 2, February 2022., 2022
Abstract This paper presents a new discretization of the rotating shallow water equations and a set of decisions, ranging from a simplification of the continuous equations down to the implementation level, yielding a code that is fast and accurate. Accuracy is reached by using WENO reconstructions on the mass flux and on the nonlinear Coriolis term ...
Guillaume Roullet, Tugdual Gaillard
wiley   +1 more source

Thermal Storage for the Analysis of Hybrid Energy Systems Based on Geothermal and Solar Power

open access: yesInternational Journal of Photoenergy, Volume 2022, Issue 1, 2022., 2022
Thermal degradation of geothermal energy occurs even during the duration of geothermal energy facilities. The enormity and efficiency of thermal energy available for electric transformation, as well as plant performance and power production, are both affected by the decrease in geofluid heat. Additionally, due to the generally increased turbine exhaust
K. U. Aravind   +8 more
wiley   +1 more source

IoT‐DeepSense: Behavioral Security Detection of IoT Devices Based on Firmware Virtualization and Deep Learning

open access: yesSecurity and Communication Networks, Volume 2022, Issue 1, 2022., 2022
Recently, IoT devices have become the targets of large‐scale cyberattacks, and their security issues have been increasingly serious. However, due to the limited memory and battery power of IoT devices, it is hardly possible to install traditional security software, such as antivirus software for security defense.
Jin Wang   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy