Results 21 to 30 of about 3,052 (265)

IMU: A Content Replacement Policy for CCN, Based on Immature Content Selection

open access: yesApplied Sciences, 2021
In-network caching is the essential part of Content-Centric Networking (CCN). The main aim of a CCN caching module is data distribution within the network. Each CCN node can cache content according to its placement policy. Therefore, it is fully equipped
Salman Rashid   +2 more
doaj   +1 more source

An Improved Web Cache Replacement Algorithm Based on Weighting and Cost

open access: yesIEEE Access, 2018
Cache memory plays an important role in improving the performance of web servers, especially for big data transmission, which response time is constrained. It is necessary to use an effective method, such as web cache.
Tinghuai Ma   +4 more
doaj   +1 more source

Spherical Fuzzy Rough EDAS Method Under Einstein Aggregation Operators Applications in Cache Replacement Policy

open access: yesIEEE Access, 2023
The cache replacement policy (CRP) can reduce cache redundancy, improve cache usefulness, and increase network efficiency in content-centric networks (CCN). The essential challenges in addressing CRP in (CCN) evaluation involve significant fuzziness.
Muhammad Ali Khan   +2 more
doaj   +1 more source

Security Analysis of Cache Replacement Policies [PDF]

open access: yes, 2017
Modern computer architectures share physical resources between different programs in order to increase area-, energy-, and cost-efficiency. Unfortunately, sharing often gives rise to side channels that can be exploited for extracting or transmitting sensitive information.
Cañones Martín, Pablo   +2 more
openaire   +3 more sources

Research on Content Priority-Based Caching Strategy in NDMANET [PDF]

open access: yesJisuanji gongcheng, 2021
Most of NDMANET caching strategies do not consider the priority of content,which reduces the usability of important content in mobile environment.To address the problem,this paper proposes a cache replacement strategy PFC based on content priority.The ...
GAO Zixuan, ZHENG Quan
doaj   +1 more source

Intelligent design of network multimedia using big data and virtual Artificial Intelligence technology

open access: yesIET Networks, EarlyView., 2023
The topic discussed was the intelligent design of network multimedia using BD and virtual AI technology. First of all, the authors gave a brief overview of its relevant research background, and then comprehensively analysed the advantages and disadvantages of previous scholars' research on network multimedia.
Xin Zhang
wiley   +1 more source

Learning Future Reference Patterns for Efficient Cache Replacement Decisions

open access: yesIEEE Access, 2022
This study proposes a cache replacement policy technique to increase the cache hit rate. This policy can improve the efficiency of cache management and performance.
Hyejeong Choi, Sejin Park
doaj   +1 more source

Cache Replacement Strategy With Limited Service Capacity in Heterogeneous Networks

open access: yesIEEE Access, 2020
Recently, cellular networks face a huge challenge to satisfy large increment of user demands for higher-speed and lower-latency communication service. One promising solution is to apply the cache technology in edge cache networks to reduce redundant data
Le Jiang, Xinglin Zhang
doaj   +1 more source

Replacement problem in Web caching [PDF]

open access: yesProceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003, 2004
Caching has been recognized as an effective scheme for avoiding service bottleneck and reducing network traffic in World Wide Web. Our work focuses on the replacement problem in Web caching, which arises due to limited storage. We seek the best configuration for a fully connected network of N caches. The problem is formulated as a discrete optimization
Çakıroğlu, Seda, Arıkan, Erdal
openaire   +2 more sources

Cache of cryptographic key based on query popularity

open access: yes网络与信息安全学报, 2023
In the current HDFS (Hadoop Distributed File System) key management system, the encryption zone keys are all loaded into the memory during startup of key service.With the increase of the key resource, the occupied memory space also grows, bringing the ...
Wei JIN   +4 more
doaj   +3 more sources

Home - About - Disclaimer - Privacy