Results 101 to 110 of about 86,694 (238)
Aiming at cache pollution attacks in content centric networking,the attacks were quantitatively described by three parameters,namely number of pollution contents,distribution of attack requests and attack intensity,then the cache state model of node ...
Hong-bo TANG +3 more
doaj +2 more sources
Video caching and scheduling with edge cooperation
In this paper, we explore a distributed collaborative caching and computing model to support the distribution of adaptive bit rate video streaming.
Zhidu Li +4 more
doaj +1 more source
Multi-agent Cooperative Caching Strategy Based on TD3 Algorithm [PDF]
To reduce content-acquisition delay and transmission overhead in mobile edge networks, a Multi-Agent Cooperative Caching algorithm(MACC) based on a Twin Delayed Deep Deterministic(TD3) policy gradient is proposed. First, a multi-agent edge cache model is
ZENG Jianzhou, LI Zeping, ZHANG Suqin
doaj +1 more source
ABSTRACT Large language models (LLMs) have made remarkable advances in natural language processing, demonstrating great potential in modelling structured sequences. However, adapting these capabilities to machine gaming tasks such as Go remains challenging due to limitations in strategy generalisation and optimisation efficiency.
Xiali Li +5 more
wiley +1 more source
Power Allocation for Cache-Aided Small-Cell Networks With Limited Backhaul
Cache-aided small-cell network is becoming an effective method to improve the transmission rate and reduce the backhaul load. Due to the limited capacity of backhaul, less power should be allocated to users whose requested contents do not exist in the ...
Fen Cheng +5 more
doaj +1 more source
Integrated Cache Scheduling Replacement Algorithm to Reduce Cache Pollution
Cache memory management has recently become one of the most crucial research topics in the area of high performance computing. The cache memory has gained popularity due to its capability to offer faster access compared to main memory so processor can access data directly through cache very efficiently.
Kavita Kalambe +3 more
openaire +1 more source
Many applications are hosted on cloud databases where several applications share the same database instance. Such database management system exhibits periodic behavior in terms of data references. For example, U.S.
Atul O. Thakare, Parag S. Deshpande
doaj +1 more source
Apex predators exploit advantageous snow conditions across hunting modes
Advantageous snow conditions—in terms of snow depth and density—are among the most important features of the winter landscape for two apex predators, regardless of hunting strategy. In a warming climate, the knock‐on effects of a diminishing snowpack may reduce the hunting success of multiple large carnivore species.
Benjamin K. Sullender +7 more
wiley +1 more source
04301 Abstracts Collection – Cache-Oblivious and Cache-Aware Algorithms
The Dagstuhl Seminar 04301 ``Cache-Oblivious and Cache-Aware Algorithms'' was held in the International Conference and Research Center (IBFI), Schloss Dagstuhl, from 18.07.2004 to 23.07.2004. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed.
Arge, Lars +4 more
openaire +3 more sources
A “Tech First” Approach to Foreign Policy? The Three Meanings of Tech Diplomacy
ABSTRACT Scholars have recently argued that international politics is plagued by instability as the world rapidly transitions from one crisis to another. This state of “Permacrisis,” or permanent crises between states, is driven by technological innovations which create new kinds of crises and drive competitions between adversarial states.
Ilan Manor
wiley +1 more source

