Results 11 to 20 of about 7,552,821 (296)
Data flow dissemination in a network
We consider the following network model motivated, in particular, by blockchains and peer-to-peer live streaming. Data packet flows arrive at the network nodes and need to be disseminated to all other nodes. Packets are relayed through the network via links of finite capacity. A packet leaves the network when it is disseminated to all nodes.
Aditya Gopalan, Alexander L. Stolyar
openaire +2 more sources
Data network related to an object manufacturing inside of exerted Intelligent System [PDF]
Most of today’s information systems are not fully integrated. Companies, suppliers, and customers are rarely closely linked. Functions within a chain from the enterprise to the shop floor level are not fully integrated.
Katarina Monkova +5 more
doaj +1 more source
We present a framework enabling variational data assimilation for gradient flows in general metric spaces, based on the minimizing movement (or Jordan-Kinderlehrer-Otto) approximation scheme. After discussing stability properties in the most general case, we specialise to the space of probability measures endowed with the Wasserstein distance.
Pietschmann, Jan-Frederik +1 more
openaire +5 more sources
Objectives. The aim of the study is to search for effective methods and approaches to the processing of heterogeneous data streams and the management of problems of infinite length, conceptual evolution and conceptual drift.
R. A. Bagutdinov
doaj +1 more source
MemConFuzz: Memory Consumption Guided Fuzzing with Data Flow Analysis
Uncontrolled heap memory consumption, a kind of critical software vulnerability, is utilized by attackers to consume a large amount of heap memory and consequently trigger crashes.
Chunlai Du +4 more
doaj +1 more source
Digital Archiving and Process Management in the Bavarian State Department of Monuments and Sites
Over the last two decades, technical progress for archaeology within the Bavarian State Department of Monuments and Sites (BLfD) underwent rapid development.
Silke Jantos, C. Sebastian Sommer
doaj +1 more source
Graph database based security protection mechanism of 5G network data flow
As the 5G mobile network is closely integrated with government, medical, financial and other industries related to national economy and people’s livelihood, the security of the data carried by 5G network is crucial.5G data and flow scenarios were firstly
Li SU, Li LU, Xing ZHANG, Chang LIU
doaj
A Scientometrics Review on Farmland Abandonment Research
Using the Web of Science database, 1498 research articles published between 1900 and 2019 on the subject of farmland abandonment were retrieved. With the help of the SciMAT tool, a theme strategic diagram, overlay map and evolution map represented by ...
Yingqian Huang, Fengqin Li, Hualin Xie
doaj +1 more source
Control versus Data Flow in Parallel Database Machines [PDF]
The execution of a query in a parallel database machine can be controlled in either a control flow way, or in a data flow way. In the former case a single system node controls the entire query execution.
Blanken, Henk M., Teeuw, Wouter B.
core +2 more sources
MSLCFinder: An Algorithm in Limited Resources Environment for Finding Top-k Elephant Flows
Encrypted traffic accounts for 95% of the total traffic in the backbone network environment with Tbps bandwidth. As network traffic becomes more and more encrypted and link rates increase in modern networks, the measurement of encrypted traffic relies ...
Xianlong Dai +4 more
doaj +1 more source

