Results 21 to 30 of about 20,903 (180)
Cache Pollution Attacks in the NDN Architecture: Impact and Analysis
Named Data Networking (NDN), one of the most suitable candidates for the future Internet architecture, allows all network nodes to have a local cache that is used to serve incoming content requests. Content caching is an essential component in NDN: content is cached in routers and used for future requests in order to reduce bandwidth consumption and ...
Hidouri, Abdelhak +4 more
openaire +3 more sources
Cache Pollution Detection Method Based on GBDT in Information-Centric Network [PDF]
There is a new cache pollution attack in the information-centric network (ICN), which fills the router cache by sending a large number of requests for nonpopular content. This attack will severely reduce the router cache hit rate. Therefore, the detection of cache pollution attacks is also an urgent problem in the current information center network. In
Dapeng Man +5 more
openaire +1 more source
CFTP: a caching FTP server [PDF]
By analyzing the log files generated by the UK National Web Cache and by a number of origin FTP sites we provide evidence that an FTP proxy cache with knowledge of local (national) mirror sites could significantly reduce the amount of data that needs to ...
Hopkins, Tim, Russell, M.
core +4 more sources
A New Approach to Coding in Content Based MANETs
In content-based mobile ad hoc networks (CB-MANETs), random linear network coding (NC) can be used to reliably disseminate large files under intermittent connectivity. Conventional NC involves random unrestricted coding at intermediate nodes.
Gerla, Mario +4 more
core +1 more source
Aiming at cache pollution attacks in content centric networking,the attacks were quantitatively described by three parameters,namely number of pollution contents,distribution of attack requests and attack intensity,then the cache state model of node ...
Hong-bo TANG +3 more
doaj +2 more sources
Investigation of LSTM Based Prediction for Dynamic Energy Management in Chip Multiprocessors [PDF]
In this paper, we investigate the effectiveness of using long short-term memory (LSTM) instead of Kalman filtering to do prediction for the purpose of constructing dynamic energy management (DEM) algorithms in chip multi-processors (CMPs).
Moghaddam, Milad Ghorbani +2 more
core +2 more sources
It is challenging to achieve a consistent real-time (RT) response time in commodity virtual machine (VM) environments because they have longer and more complex network protocol stacks.
Oscar F. Garcia +2 more
doaj +1 more source
Static locality analysis for cache management [PDF]
Most memory references in numerical codes correspond to array references whose indices are affine functions of surrounding loop indices. These array references follow a regular predictable memory pattern that can be analysed at compile time.
González Colás, Antonio María +2 more
core +1 more source
Design Principles for Scaling Multi-core OLTP Under High Contention
Although significant recent progress has been made in improving the multi-core scalability of high throughput transactional database systems, modern systems still fail to achieve scalable throughput for workloads involving frequent access to highly ...
Abadi, Daniel J. +2 more
core +1 more source
Multi-task Implementation for Image Reconstruction of an AER Communication [PDF]
Address-Event-Representation (AER) is a communication protocol for transferring spikes between bio-inspired chips. Such systems may consist of a hierarchical structure with several chips that transmit spikes among them in real time, while performing ...
Civit Balcells, Antón +4 more
core +1 more source

