Results 11 to 20 of about 7,552,821 (296)

Data flow dissemination in a network

open access: yesQueueing Systems, 2023
We consider the following network model motivated, in particular, by blockchains and peer-to-peer live streaming. Data packet flows arrive at the network nodes and need to be disseminated to all other nodes. Packets are relayed through the network via links of finite capacity. A packet leaves the network when it is disseminated to all nodes.
Aditya Gopalan, Alexander L. Stolyar
openaire   +2 more sources

Data network related to an object manufacturing inside of exerted Intelligent System [PDF]

open access: yesEAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 2019
Most of today’s information systems are not fully integrated. Companies, suppliers, and customers are rarely closely linked. Functions within a chain from the enterprise to the shop floor level are not fully integrated.
Katarina Monkova   +5 more
doaj   +1 more source

Data-driven gradient flows

open access: yesETNA - Electronic Transactions on Numerical Analysis, 2022
We present a framework enabling variational data assimilation for gradient flows in general metric spaces, based on the minimizing movement (or Jordan-Kinderlehrer-Otto) approximation scheme. After discussing stability properties in the most general case, we specialise to the space of probability measures endowed with the Wasserstein distance.
Pietschmann, Jan-Frederik   +1 more
openaire   +5 more sources

APPROACH OF PROCESSING, CLASSIFICATION AND DETECTION OF NEW CLASSES AND ANOMALIES IN HETEROGENIOUS AND DIFFERENT STREAMS OF DATA

open access: yesВестник Дагестанского государственного технического университета: Технические науки, 2019
Objectives. The aim of the study is to search for effective methods and approaches to the processing of heterogeneous data streams and the management of problems of infinite length, conceptual evolution and conceptual drift.
R. A. Bagutdinov
doaj   +1 more source

MemConFuzz: Memory Consumption Guided Fuzzing with Data Flow Analysis

open access: yesMathematics, 2023
Uncontrolled heap memory consumption, a kind of critical software vulnerability, is utilized by attackers to consume a large amount of heap memory and consequently trigger crashes.
Chunlai Du   +4 more
doaj   +1 more source

Digital Archiving and Process Management in the Bavarian State Department of Monuments and Sites

open access: yesInternet Archaeology, 2021
Over the last two decades, technical progress for archaeology within the Bavarian State Department of Monuments and Sites (BLfD) underwent rapid development.
Silke Jantos, C. Sebastian Sommer
doaj   +1 more source

Graph database based security protection mechanism of 5G network data flow

open access: yesDianxin kexue, 2021
As the 5G mobile network is closely integrated with government, medical, financial and other industries related to national economy and people’s livelihood, the security of the data carried by 5G network is crucial.5G data and flow scenarios were firstly
Li SU, Li LU, Xing ZHANG, Chang LIU
doaj  

A Scientometrics Review on Farmland Abandonment Research

open access: yesLand, 2020
Using the Web of Science database, 1498 research articles published between 1900 and 2019 on the subject of farmland abandonment were retrieved. With the help of the SciMAT tool, a theme strategic diagram, overlay map and evolution map represented by ...
Yingqian Huang, Fengqin Li, Hualin Xie
doaj   +1 more source

Control versus Data Flow in Parallel Database Machines [PDF]

open access: yes, 1993
The execution of a query in a parallel database machine can be controlled in either a control flow way, or in a data flow way. In the former case a single system node controls the entire query execution.
Blanken, Henk M., Teeuw, Wouter B.
core   +2 more sources

MSLCFinder: An Algorithm in Limited Resources Environment for Finding Top-k Elephant Flows

open access: yesApplied Sciences, 2022
Encrypted traffic accounts for 95% of the total traffic in the backbone network environment with Tbps bandwidth. As network traffic becomes more and more encrypted and link rates increase in modern networks, the measurement of encrypted traffic relies ...
Xianlong Dai   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy