Results 101 to 110 of about 86,694 (238)

Detection algorithm for cache pollution attacks based on node state model in content centric networking

open access: yesTongxin xuebao, 2016
Aiming at cache pollution attacks in content centric networking,the attacks were quantitatively described by three parameters,namely number of pollution contents,distribution of attack requests and attack intensity,then the cache state model of node ...
Hong-bo TANG   +3 more
doaj   +2 more sources

Video caching and scheduling with edge cooperation

open access: yesDigital Communications and Networks
In this paper, we explore a distributed collaborative caching and computing model to support the distribution of adaptive bit rate video streaming.
Zhidu Li   +4 more
doaj   +1 more source

Multi-agent Cooperative Caching Strategy Based on TD3 Algorithm [PDF]

open access: yesJisuanji gongcheng
To reduce content-acquisition delay and transmission overhead in mobile edge networks, a Multi-Agent Cooperative Caching algorithm(MACC) based on a Twin Delayed Deep Deterministic(TD3) policy gradient is proposed. First, a multi-agent edge cache model is
ZENG Jianzhou, LI Zeping, ZHANG Suqin
doaj   +1 more source

Multitype Game Optimisation: A Two‐Stage Fine‐Tuning Framework for Multi‑Game Optimisation With Large Language Models

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Large language models (LLMs) have made remarkable advances in natural language processing, demonstrating great potential in modelling structured sequences. However, adapting these capabilities to machine gaming tasks such as Go remains challenging due to limitations in strategy generalisation and optimisation efficiency.
Xiali Li   +5 more
wiley   +1 more source

Power Allocation for Cache-Aided Small-Cell Networks With Limited Backhaul

open access: yesIEEE Access, 2017
Cache-aided small-cell network is becoming an effective method to improve the transmission rate and reduce the backhaul load. Due to the limited capacity of backhaul, less power should be allocated to users whose requested contents do not exist in the ...
Fen Cheng   +5 more
doaj   +1 more source

Integrated Cache Scheduling Replacement Algorithm to Reduce Cache Pollution

open access: yesInternational Journal of Recent Technology and Engineering (IJRTE), 2019
Cache memory management has recently become one of the most crucial research topics in the area of high performance computing. The cache memory has gained popularity due to its capability to offer faster access compared to main memory so processor can access data directly through cache very efficiently.
Kavita Kalambe   +3 more
openaire   +1 more source

A Novel Adaptive Database Cache Optimization Algorithm Based on Predictive Working Sets in Cloud Environment

open access: yesIEEE Access, 2019
Many applications are hosted on cloud databases where several applications share the same database instance. Such database management system exhibits periodic behavior in terms of data references. For example, U.S.
Atul O. Thakare, Parag S. Deshpande
doaj   +1 more source

Apex predators exploit advantageous snow conditions across hunting modes

open access: yesJournal of Animal Ecology, EarlyView.
Advantageous snow conditions—in terms of snow depth and density—are among the most important features of the winter landscape for two apex predators, regardless of hunting strategy. In a warming climate, the knock‐on effects of a diminishing snowpack may reduce the hunting success of multiple large carnivore species.
Benjamin K. Sullender   +7 more
wiley   +1 more source

04301 Abstracts Collection – Cache-Oblivious and Cache-Aware Algorithms

open access: yes, 2005
The Dagstuhl Seminar 04301 ``Cache-Oblivious and Cache-Aware Algorithms'' was held in the International Conference and Research Center (IBFI), Schloss Dagstuhl, from 18.07.2004 to 23.07.2004. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed.
Arge, Lars   +4 more
openaire   +3 more sources

A “Tech First” Approach to Foreign Policy? The Three Meanings of Tech Diplomacy

open access: yesGlobal Policy, EarlyView.
ABSTRACT Scholars have recently argued that international politics is plagued by instability as the world rapidly transitions from one crisis to another. This state of “Permacrisis,” or permanent crises between states, is driven by technological innovations which create new kinds of crises and drive competitions between adversarial states.
Ilan Manor
wiley   +1 more source

Home - About - Disclaimer - Privacy