Results 131 to 140 of about 20,930 (183)

Energy efficient UAV-assisted two layer hierarchical bit-mapping access based MAC protocol. [PDF]

open access: yesSci Rep
Narayan Golatkar D   +5 more
europepmc   +1 more source

Detecting Cache Pollution Attacks Using Bloom Filter

open access: closed2021 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN), 2021
To provide web browsing and video streaming services with desirable quality, cache servers have been widely used to deliver digital data to users from locations close to users. For example, in the MEC (mobile edge computing), cache memories are provided at base stations of 5G cellular networks to reduce the traffic load in the backhaul networks.
Takakazu Ashihara, Noriaki Kamiyama
openaire   +2 more sources

Home - About - Disclaimer - Privacy