Results 61 to 70 of about 43,044 (189)

ECIS: Energy‐Computing Integrated System

open access: yesEnergy Internet, Volume 2, Issue 2, Page 115-125, July 2025.
ABSTRACT With the growing demand for deep integration between computing power networks (CPNs) and energy systems (ESs), effective collaboration between these systems has become increasingly crucial. To facilitate such integration, this paper proposes an energy‐computing integrated system (ECIS), which consists of a four‐layer framework including a ...
Haoming Zhang   +5 more
wiley   +1 more source

PERFORMANCE ANALYSIS BETWEEN EXPLICIT SCHEDULING AND IMPLICIT SCHEDULING OF PARALLEL ARRAY-BASED DOMAIN DECOMPOSITION USING OPENMP [PDF]

open access: yesJournal of Engineering Science and Technology, 2014
With the continuous revolution of multicore architecture, several parallel programming platforms have been introduced in order to pave the way for fast and efficient development of parallel algorithms.
MOHAMMED FAIZ ABOALMAALY   +3 more
doaj  

Entropy/IP: Uncovering Structure in IPv6 Addresses

open access: yes, 2016
In this paper, we introduce Entropy/IP: a system that discovers Internet address structure based on analyses of a subset of IPv6 addresses known to be active, i.e., training data, gleaned by readily available passive and active means.
Drake A. W.   +9 more
core   +1 more source

Evaluation of RPL’s Single Metric Objective Functions [PDF]

open access: yes, 2017
In this paper, we evaluate the performance of RPL (IPv6 Routing Protocol for Low Power and Lossy Networks) based on the Objective Function being used to construct the Destination Oriented Directed Acyclic Graph (DODAG).
Alayed, Walaa   +2 more
core   +1 more source

IoT and Man‐in‐the‐Middle Attacks

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 2, March/April 2025.
ABSTRACT This article provides an overview of the Internet of things (IoT) and its growing significance in today's interconnected world. It discusses the concept of man‐in‐the‐middle (MitM) attacks in detail, including their various types, causes, and potential impacts on IoT networks.
Hamidreza Fereidouni   +2 more
wiley   +1 more source

Preserving Established Communications in IPv6 Multi-homed Sites with MEX [PDF]

open access: yes, 2003
This research was supported by the SAM (Advanced Mobility Services) project, funded by the Spanish National R&D Programme under contract MCYT TIC2002-04531-C04-03.A proper support for multimedia communications transport has to provide fault tolerance ...
Azcorra, Arturo   +4 more
core   +3 more sources

Equivalence and difference of the dual device under test setup and the single device under test setup of RFC 8219

open access: yesInternational Journal of Communication Systems, Volume 38, Issue 3, February 2025.
The throughput results of the dual DUT setup could approximate well that of the single DUT setup. Their difference followed the predictions of our theoretical considerations. However, the latency results did not always follow the theoretical expectations.
Gábor Lencse, Szabolcs Szilágyi
wiley   +1 more source

A comprehensive survey on software‐defined networking for smart communities

open access: yesInternational Journal of Communication Systems, Volume 38, Issue 1, 10 January 2025.
Key findings: •$$ \bullet $$ The background and history of the evolution of software‐defined networking (SDN) are discussed. •$$ \bullet $$ SDN architecture and OpenFlow infrastructure are discussed, wherein OpenFlow components and switches are classified concerning different parameters.
Rajat Chaudhary   +3 more
wiley   +1 more source

Overcoming obstacles to IPv6 on WLCG [PDF]

open access: yesEPJ Web of Conferences
The transition of the Worldwide Large Hadron Collider Computing Grid (WLCG) storage services to dual-stack IPv6/IPv4 is almost complete; all Tier-1 and 94% of Tier-2 storage are IPv6 enabled.
Babik Marian   +20 more
doaj   +1 more source

Segment Routing: a Comprehensive Survey of Research Activities, Standardization Efforts and Implementation Results

open access: yes, 2020
Fixed and mobile telecom operators, enterprise network operators and cloud providers strive to face the challenging demands coming from the evolution of IP networks (e.g.
Abdelsalam, Ahmed   +7 more
core   +1 more source

Home - About - Disclaimer - Privacy