Results 51 to 60 of about 13,920 (234)

Systematically testing OpenFlow controller applications

open access: yesComputer Networks, 2015
The emergence of OpenFlow-capable switches enables exciting new network functionality, at the risk of programming errors that make communication less reliable. The centralized programming model, where a single controller program manages the network, seems to reduce the likelihood of bugs.
Peter Perešíni   +5 more
openaire   +3 more sources

P4‐QUPF: A P4‐Based QoS Framework for 5G‐UPF

open access: yesInternational Journal of Network Management, Volume 35, Issue 6, November/December 2025.
ABSTRACT The demands of today's 5G mobile network, especially low latency and high bandwidth, are a big challenge for the 5G Core (5GC) provider. The most critical user data packet handler in the 5GC network function (NF) is the user plane function (UPF), which is responsible for moving data from the user equipment to the destination data network, and ...
Muhammad Shahid Iqbal   +3 more
wiley   +1 more source

Impact of Nodal Centrality Measures to Robustness in Software-Defined Networking

open access: yesAdvances in Electrical and Electronic Engineering, 2014
The paper deals with the network robustness from the perspective of nodal centrality measures and its applicability in Software-Defined Networking (SDN).
Tomas Hegr, Leos Bohac
doaj   +1 more source

Efficient lookup method of OpenFlow table based on predictive caching [PDF]

open access: yesJisuanji gongcheng, 2019
There are serious performance bottlenecks of flow table lookups as OpenFlow supports wildcard search.Therefore,a lookup method of OpenFlow table is proposed based on network traffic locality.By caching recent frequent connections in packet traffic and ...
FU Ming,HE Yang,XIONG Bing
doaj   +1 more source

Eliminating Network Protocol Vulnerabilities Through Abstraction and Systems Language Design

open access: yes, 2013
Incorrect implementations of network protocol message specifications affect the stability, security, and cost of network system development. Most implementation defects fall into one of three categories of well defined message constraints.
Casey, C. Jasson   +3 more
core   +1 more source

Discovering the network topology: an efficient approach for SDN [PDF]

open access: yes, 2016
Network topology is a physical description of the overall resources in the network. Collecting this information using efficient mechanisms becomes a critical task for important network functions such as routing, network management, quality of service ...
Cervelló Pastor, Cristina   +2 more
core   +4 more sources

A good‐practice guide to solving and refining molecular organic crystal structures from laboratory powder X‐ray diffraction data

open access: yesActa Crystallographica Section C, Volume 81, Issue 10, Page 559-569, October 2025.
A step‐by‐step outline for academic and industrial practitioners determining molecular organic crystal structures from powder X‐ray diffraction data.This article focuses on a specific real‐space methodology for solving and refining molecular organic crystal structures, developed by the authors and collaborators.
Elena Kabova   +4 more
wiley   +1 more source

Design of Luminescent Heteronuclear Au(I)‐Ag(I) Systems from Aromatic Diazines

open access: yesZeitschrift für anorganische und allgemeine Chemie, Volume 651, Issue 4, March 10, 2025.
Novel heteronuclear Au(I)‐Ag(I) heterometallic complexes with different diazines or perhalophenyl ligands display intense emissions, which are related to the supramolecular arrangements found in the solid state. By reaction of the polymers [Au2Ag2(C6X5)4(OEt2)2]n (X = F, Cl) with the aromatic N‐donor ligands pyrimidine and pyrazine, the new ...
Ainhoa Rodríguez‐Gobernado   +5 more
wiley   +1 more source

Enabling Quantum Privacy and Security by Design: Imperatives for Contemporary State‐of‐the‐Art in Quantum Software Engineering

open access: yesJournal of Software: Evolution and Process, Volume 37, Issue 2, February 2025.
ABSTRACT With the advent of Quantum Computing and its exponential research endeavors in the past couple of decades, we are looking at a Golden Era of Quantum Computing. We are transitioning into an age of Hybrid Classical‐Quantum Computers, where the quantum computational resources are selectively harnessed for resource‐intensive tasks. On the one hand,
Vita Santa Barletta   +4 more
wiley   +1 more source

LineSwitch: Efficiently Managing Switch Flow in Software-Defined Networking while Effectively Tackling DoS Attacks

open access: yes, 2015
Software Defined Networking (SDN) is a new networking architecture which aims to provide better decoupling between network control (control plane) and data forwarding functionalities (data plane).
Ambrosin, Moreno   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy