Results 71 to 80 of about 10,571 (202)

Distributed VNF Scaling in Large-scale Datacenters: An ADMM-based Approach

open access: yes, 2017
Network Functions Virtualization (NFV) is a promising network architecture where network functions are virtualized and decoupled from proprietary hardware.
Kellerer, Wolfgang   +3 more
core   +1 more source

Forest Loss Influences Biomass Distribution Across Trophic Groups of Amazonian Stream Insects

open access: yesFreshwater Biology, Volume 71, Issue 2, February 2026.
ABSTRACT Changes in resource availability caused by deforestation can negatively impact freshwater ecosystems, with implications for trophic chains. We investigated both the direct and indirect effects of forest cover and allochthonous resource availability on the biomass distribution of larvae of aquatic insects (Ephemeroptera, Plecoptera, Trichoptera
Gabriel Martins Cruz   +8 more
wiley   +1 more source

Dynamic migration method of key virtual network function based on risk awareness

open access: yesTongxin xuebao, 2020
Aiming at the problems that traditional dynamic migration methods have many migration nodes,high migration frequency,and long service function chain (SFC) link path after migration when dealing with side channel attack,a dynamic migration method of ...
Shaohu DING   +4 more
doaj   +2 more sources

Reimagining Urban River Bathing in Europe: A Multisectoral and Interdisciplinary Dive Into Lyon's Rivers (France)

open access: yesRiver Research and Applications, Volume 42, Issue 1, Page 224-241, January 2026.
ABSTRACT Urban river bathing is re‐emerging across Europe, driven by social demand and climate change impacts. The Urban Bathing Consortium, an interdisciplinary and intersectoral consortium initiated at the University of Lyon (France), is at the forefront of studying the challenges and opportunities of creating and managing healthy, safe, and ...
Yixin Cao   +22 more
wiley   +1 more source

Creating Tailored and Adaptive Network Services with the Open Orchestration C-RAN Framework

open access: yes, 2018
Next generation wireless communications networks will leverage software-defined radio and networking technologies, combined with cloud and fog computing. A pool of resources can then be dynamically allocated to create personalized network services (NSs).
Floriach-Pigem, Marti   +3 more
core   +1 more source

Enhancing E‐Commerce Security Based on Involution Function Using Twin Key AES Cipher

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
In the realm of surging e‐commerce data and increasing digital transactions, ensuring end‐to‐end security is paramount to protect sensitive information and maintain user trust. The Advanced Encryption Standard (AES), a cornerstone of network security, relies on symmetric key encryption for secure communication.
Biresh Kumar   +11 more
wiley   +1 more source

Network Functions Virtualization Architecture for Gateways for Virtualized Wireless Sensor and Actuator Networks

open access: yes, 2016
Virtualization enables multiple applications to share the same wireless sensor and actuator network (WSAN). However, in heterogeneous environments, virtualized wireless sensor and actuator networks (VWSAN) raise new challenges, such as the need for on ...
Abu-Lebdeh, Mohammad   +6 more
core   +1 more source

Surgical Site Infection in Coronary Artery Bypass: Observational Study

open access: yesInternational Journal of Nursing Practice, Volume 32, Issue 2, April 2026.
ABSTRACT Background Preventing surgical site infections plays a crucial role in ensuring patient safety during coronary artery bypass grafting. To reduce incidence rates, it is essential to implement evidence‐based best practice measures. However, there is a noticeable lack of studies assessing healthcare professionals' adherence to these measures ...
Camila Vieira Gebhardt   +5 more
wiley   +1 more source

Safeguarding VNF Credentials with Intel SGX

open access: yesProceedings of the SIGCOMM Posters and Demos, 2017
Operators use containers – enabled by operating system (OS) level virtualization – to deploy virtual network functions (VNFs) that access the centralized network controller in software-defined net- ...
Paladi, Nicolae, Karlsson, Linus
openaire   +4 more sources

BUNKER: A Blockchain-based trUsted VNF pacKagE Repository [PDF]

open access: yes, 2019
Current projects applying blockchain technology to enhance the trust of NFV environments do not consider the VNF repository. However, the blockchain’s properties can enhance trust by allowing to verify a VNF package’s integrity without relying (a) on a Trusted Third Party (TTP) for remote attestation or (b) a secure database. This paper presents BUNKER,
Scheid, Eder John   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy