Results 21 to 30 of about 20,903 (180)

Cache Pollution Attacks in the NDN Architecture: Impact and Analysis

open access: yes2021 International Conference on Software, Telecommunications and Computer Networks (SoftCOM), 2021
Named Data Networking (NDN), one of the most suitable candidates for the future Internet architecture, allows all network nodes to have a local cache that is used to serve incoming content requests. Content caching is an essential component in NDN: content is cached in routers and used for future requests in order to reduce bandwidth consumption and ...
Hidouri, Abdelhak   +4 more
openaire   +3 more sources

Cache Pollution Detection Method Based on GBDT in Information-Centric Network [PDF]

open access: yesSecurity and Communication Networks, 2021
There is a new cache pollution attack in the information-centric network (ICN), which fills the router cache by sending a large number of requests for nonpopular content. This attack will severely reduce the router cache hit rate. Therefore, the detection of cache pollution attacks is also an urgent problem in the current information center network. In
Dapeng Man   +5 more
openaire   +1 more source

CFTP: a caching FTP server [PDF]

open access: yes, 1998
By analyzing the log files generated by the UK National Web Cache and by a number of origin FTP sites we provide evidence that an FTP proxy cache with knowledge of local (national) mirror sites could significantly reduce the amount of data that needs to ...
Hopkins, Tim, Russell, M.
core   +4 more sources

A New Approach to Coding in Content Based MANETs

open access: yes, 2014
In content-based mobile ad hoc networks (CB-MANETs), random linear network coding (NC) can be used to reliably disseminate large files under intermittent connectivity. Conventional NC involves random unrestricted coding at intermediate nodes.
Gerla, Mario   +4 more
core   +1 more source

Detection algorithm for cache pollution attacks based on node state model in content centric networking

open access: yesTongxin xuebao, 2016
Aiming at cache pollution attacks in content centric networking,the attacks were quantitatively described by three parameters,namely number of pollution contents,distribution of attack requests and attack intensity,then the cache state model of node ...
Hong-bo TANG   +3 more
doaj   +2 more sources

Investigation of LSTM Based Prediction for Dynamic Energy Management in Chip Multiprocessors [PDF]

open access: yes, 2018
In this paper, we investigate the effectiveness of using long short-term memory (LSTM) instead of Kalman filtering to do prediction for the purpose of constructing dynamic energy management (DEM) algorithms in chip multi-processors (CMPs).
Moghaddam, Milad Ghorbani   +2 more
core   +2 more sources

Achieving Consistent Real-Time Latency at Scale in a Commodity Virtual Machine Environment Through Socket Outsourcing-Based Network Stacks

open access: yesIEEE Access, 2018
It is challenging to achieve a consistent real-time (RT) response time in commodity virtual machine (VM) environments because they have longer and more complex network protocol stacks.
Oscar F. Garcia   +2 more
doaj   +1 more source

Static locality analysis for cache management [PDF]

open access: yes, 1997
Most memory references in numerical codes correspond to array references whose indices are affine functions of surrounding loop indices. These array references follow a regular predictable memory pattern that can be analysed at compile time.
González Colás, Antonio María   +2 more
core   +1 more source

Design Principles for Scaling Multi-core OLTP Under High Contention

open access: yes, 2016
Although significant recent progress has been made in improving the multi-core scalability of high throughput transactional database systems, modern systems still fail to achieve scalable throughput for workloads involving frequent access to highly ...
Abadi, Daniel J.   +2 more
core   +1 more source

Multi-task Implementation for Image Reconstruction of an AER Communication [PDF]

open access: yes, 2007
Address-Event-Representation (AER) is a communication protocol for transferring spikes between bio-inspired chips. Such systems may consist of a hierarchical structure with several chips that transmit spikes among them in real time, while performing ...
Civit Balcells, Antón   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy