Results 71 to 80 of about 10,571 (202)
Distributed VNF Scaling in Large-scale Datacenters: An ADMM-based Approach
Network Functions Virtualization (NFV) is a promising network architecture where network functions are virtualized and decoupled from proprietary hardware.
Kellerer, Wolfgang +3 more
core +1 more source
Forest Loss Influences Biomass Distribution Across Trophic Groups of Amazonian Stream Insects
ABSTRACT Changes in resource availability caused by deforestation can negatively impact freshwater ecosystems, with implications for trophic chains. We investigated both the direct and indirect effects of forest cover and allochthonous resource availability on the biomass distribution of larvae of aquatic insects (Ephemeroptera, Plecoptera, Trichoptera
Gabriel Martins Cruz +8 more
wiley +1 more source
Dynamic migration method of key virtual network function based on risk awareness
Aiming at the problems that traditional dynamic migration methods have many migration nodes,high migration frequency,and long service function chain (SFC) link path after migration when dealing with side channel attack,a dynamic migration method of ...
Shaohu DING +4 more
doaj +2 more sources
ABSTRACT Urban river bathing is re‐emerging across Europe, driven by social demand and climate change impacts. The Urban Bathing Consortium, an interdisciplinary and intersectoral consortium initiated at the University of Lyon (France), is at the forefront of studying the challenges and opportunities of creating and managing healthy, safe, and ...
Yixin Cao +22 more
wiley +1 more source
Creating Tailored and Adaptive Network Services with the Open Orchestration C-RAN Framework
Next generation wireless communications networks will leverage software-defined radio and networking technologies, combined with cloud and fog computing. A pool of resources can then be dynamically allocated to create personalized network services (NSs).
Floriach-Pigem, Marti +3 more
core +1 more source
Enhancing E‐Commerce Security Based on Involution Function Using Twin Key AES Cipher
In the realm of surging e‐commerce data and increasing digital transactions, ensuring end‐to‐end security is paramount to protect sensitive information and maintain user trust. The Advanced Encryption Standard (AES), a cornerstone of network security, relies on symmetric key encryption for secure communication.
Biresh Kumar +11 more
wiley +1 more source
Virtualization enables multiple applications to share the same wireless sensor and actuator network (WSAN). However, in heterogeneous environments, virtualized wireless sensor and actuator networks (VWSAN) raise new challenges, such as the need for on ...
Abu-Lebdeh, Mohammad +6 more
core +1 more source
Surgical Site Infection in Coronary Artery Bypass: Observational Study
ABSTRACT Background Preventing surgical site infections plays a crucial role in ensuring patient safety during coronary artery bypass grafting. To reduce incidence rates, it is essential to implement evidence‐based best practice measures. However, there is a noticeable lack of studies assessing healthcare professionals' adherence to these measures ...
Camila Vieira Gebhardt +5 more
wiley +1 more source
Safeguarding VNF Credentials with Intel SGX
Operators use containers – enabled by operating system (OS) level virtualization – to deploy virtual network functions (VNFs) that access the centralized network controller in software-defined net- ...
Paladi, Nicolae, Karlsson, Linus
openaire +4 more sources
BUNKER: A Blockchain-based trUsted VNF pacKagE Repository [PDF]
Current projects applying blockchain technology to enhance the trust of NFV environments do not consider the VNF repository. However, the blockchain’s properties can enhance trust by allowing to verify a VNF package’s integrity without relying (a) on a Trusted Third Party (TTP) for remote attestation or (b) a secure database. This paper presents BUNKER,
Scheid, Eder John +3 more
openaire +1 more source

