Results 81 to 90 of about 26,223 (284)

Low Latency Security Function Chain Embedding Across Multiple Domains

open access: yesIEEE Access, 2018
5G network is envisioned to provide massive connectivity for a wide range of applications, such as ultra-clear media, internet of vehicles, and smart home.
Qi Xu   +3 more
doaj   +1 more source

Discovering, quantifying, and displaying attacks

open access: yes, 2016
In the design of software and cyber-physical systems, security is often perceived as a qualitative need, but can only be attained quantitatively. Especially when distributed components are involved, it is hard to predict and confront all possible attacks.
Nielson, Flemming   +2 more
core   +1 more source

A light‐triggered Time‐Resolved X‐ray Solution Scattering (TR‐XSS) workflow with application to protein conformational dynamics

open access: yesFEBS Open Bio, EarlyView.
Time‐resolved X‐ray solution scattering captures how proteins change shape in real time under near‐native conditions. This article presents a practical workflow for light‐triggered TR‐XSS experiments, from data collection to structural refinement. Using a calcium‐transporting membrane protein as an example, the approach can be broadly applied to study ...
Fatemeh Sabzian‐Molaei   +3 more
wiley   +1 more source

Network function parallelism configuration with segment routing over IPv6 based on deep reinforcement learning

open access: yesETRI Journal
Network function parallelism (NFP) has gained attention for processing packets in parallel through service functions arranged in the required service function chain.
Seokwon Jang   +5 more
doaj   +1 more source

Composing and deploying parallelized service function chains

open access: yesJournal of Network and Computer Applications, 2020
Abstract Network Function Virtualization (NFV) provides great flexibility in solving the problem of deploying service function chains (SFCs). The existing serial SFCs organize virtual network functions (VNFs) in a predefined order and execute the VNFs one by one, which can result in high SFC delay as the lengths of the SFCs increases.
Jun Cai 0002   +5 more
openaire   +2 more sources

Cutaneous Melanoma Drives Metabolic Changes in the Aged Bone Marrow Immune Microenvironment

open access: yesAging and Cancer, EarlyView.
Melanoma, the deadliest form of skin cancer, increasingly affects older adults. Our study reveals that melanoma induces changes in iron and lipid levels in the bone marrow, impacting immune cell populations and increasing susceptibility to ferroptosis.
Alexis E. Carey   +12 more
wiley   +1 more source

Application of Machine Learning Algorithms for Traffic Forecasting in Dynamic Optical Networks with Service Function Chains

open access: yesFoundations of Computing and Decision Sciences, 2020
Knowledge about future optical network traffic can be beneficial for network operators in terms of decreasing an operational cost due to efficient resource management.
Szostak Daniel, Walkowiak Krzysztof
doaj   +1 more source

Fluid and Neuroimaging Biomarkers in Microgliopathy Colony‐Stimulating Factor‐1 Receptor‐Related Disorders

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective This study aims to identify both fluid and neuroimaging biomarkers for CSF1R‐RD that can inform the optimal timing of treatment administration to maximize therapeutic benefit, while also providing sensitive quantitative measurements to monitor disease progression.
Tomasz Chmiela   +13 more
wiley   +1 more source

Virtual Network Function Placement for Service Chaining by Relaxing Visit Order and Non-Loop Constraints

open access: yesIEEE Access, 2019
Network Function Virtualization (NFV) is a paradigm that virtualizes traditional network functions and instantiates Virtual Network Functions (VNFs) as software instances separate from hardware appliances.
Naoki Hyodo   +3 more
doaj   +1 more source

SDN based Network Function Parallelism in Cloud

open access: yes, 2018
Network function virtualization (NFV) based service function chaining (SFC) allows the provisioning of various security and traffic engineering applications in a cloud network.
Chowdhary, Ankur, Huang, Dijiang
core  

Home - About - Disclaimer - Privacy