Results 51 to 60 of about 401 (175)
A Thorough Review of Security in Information‐Centric Networking
The rapid evolution of technology has revealed the limitations of host‐centric or IP address–based networks. To overcome these limitations, a new communication paradigm has emerged: the information‐centric networking (ICN), which focuses on content (data) regardless of its location in the network.
Ado Adamou Abba Ari +7 more
wiley +1 more source
Considerations on the Adoption of Named Data Networking (NDN) in Tactical Environments [PDF]
Mobile military networks are uniquely challenging to build and maintain, because of their wireless nature and the unfriendliness of the environment, resulting in unreliable and capacity limited performance. Currently, most tactical networks implement TCP/IP, which was designed for fairly stable, infrastructure-based environments, and requires ...
Campioni L. +4 more
openaire +2 more sources
Sedimentary environment geochemical indicators and physical property comparison profiles of different lithofacies bauxite rocks. Abstract The breakthrough of bauxite natural gas in the Taiyuan Formation in the Longdong area of the Ordos Basin makes bauxite natural gas gradually become a new exploration direction.
Yin Yuan +3 more
wiley +1 more source
Abstract The local‐inertial approximations of the shallow water equations (SWEs) have been used for flood forecasting at larger spatial scales owing to the improved computational efficiency and similar accuracy compared to the full 2D SWEs. With the availability of high‐resolution elevation data, the complex terrain of urban areas with various small ...
N. Nithila Devi, Soumendra Nath Kuiry
wiley +1 more source
Name Filter: A Countermeasure Against Information Leakage Attacks in Named Data Networking
Named data networking (NDN) has emerged as a future networking architecture having the potential to replace the Internet. In order to do so, the NDN needs to cope with inherent problems of the Internet, such as attacks that cause information leakage from
Daishi Kondo +4 more
doaj +1 more source
Abstract Background Despite the enactment of disability laws/policies in India, research shows that caregivers of adults with intellectual and/or developmental disabilities experience inadequate formal supports/services due to dissemination barriers and lack of awareness about them.
Sumithra Murthy +2 more
wiley +1 more source
NDN caching strategy based on node median and edge popularity [PDF]
Aiming at the redundancy and inefficiency of most caching strategy in Named Data Networking(NDN) architecture,a caching placement strategy BEP based on node median and edge content popularity is proposed.Combining the median centrality of node with the ...
CHEN Jiebo,ZHENG Quan,WANG Song
doaj +1 more source
Named Data Networking (NDN) is a promising network architecture that differs from the traditional TCP/IP network, as it focuses on data rather than the host. A new secure model is required to provide the data‐oriented trust instead of the host‐oriented trust.
Bing Li +3 more
wiley +1 more source
Design and Implementation of DHT Algorithm for NDN
A novel distributed Hash table(DHT)algorithm under named data networking(NDN), which was called ndnDHT, was proposed. The algorithm brings the DHT to NDN for the first time. A new binary method using the structure of NDN was designed.
Kai Lei, Meng Yuan
doaj +2 more sources
The multiverse optimizer (MVO) is increasingly recognized across various scientific disciplines for its robust search capabilities that enhance decision‐making in diverse tasks. Despite its strengths, MVO often encounters limitations due to premature convergence, reducing its overall efficiency.
Vu Hong Son Pham +3 more
wiley +1 more source

