Results 41 to 50 of about 107,397 (277)
Characterizing Service Level Objectives for Cloud Services: Motivation of Short-Term Cache Allocation Performance Modeling [PDF]
Service level objectives (SLOs) stipulate performance goals for cloud applications, microservices, and infrastructure. SLOs are widely used, in part, because system managers can tailor goals to their products, companies, and workloads.
Ding, Jianru
core +1 more source
We demonstrate zero-touch device bootstrapping, monitoring, and L3-VPN service management using the novel TeraFlow OS SDN controller prototype. TeraFlow aims at producing a cloud-native carrier-grade SDN controller offering scalability, extensibility ...
Lluís Gifre +19 more
semanticscholar +1 more source
ANALISIS PRODUKSI SUSU SAPI PERAH DI INDONESIA [PDF]
Cow's milk is large in contributing to meeting the needs of people in developing countries to meet nutritional fulfillment. Cow's milk has increased imports due to the problem of cow disease which cannot meet the needs of the Indonesian people who ...
Khairunnisa, Yanita Melga Fitria
core
Estimation of the number of users and the market of network data equipment in the upcoming years [PDF]
In this article, with the aim of estimating the number of personal and organizational users of the country's data network, followed by estimating the market for the required equipment for the next few years, first the statistics of different groups of ...
M. Sheikhan, M. Kalantari
doaj +3 more sources
Flexible and Concurrent All-Optical VPN in OFDMA PON
We propose and experimentally demonstrate a new scheme to support an all-optical virtual private network (VPN) in orthogonal frequency-division multiple-access passive optical networks (OFDMA PONs). In our scheme, VPN communications among optical network
Xiaofeng Hu +5 more
doaj +1 more source
Teknologi jaringan saat ini berkembang pesat salah satunya teknologi VPN hal ini sangat berguna pada pertukaran data yang terjadi agar dapat berjalan dengan aman dan lancar, dengan harapan jaringan tersebut dapat meningkatkan kinerja dan ...
Sari Dewi, Sulistiyah Sulistiyah
semanticscholar +1 more source
A VPN-Encrypted Traffic Identification Method Based on Ensemble Learning
One of the foundational and key means of optimizing network service in the field of network security is traffic identification. Various data transmission encryption technologies have been widely employed in recent years.
Jie Cao +4 more
semanticscholar +1 more source
Background: Ischemic stroke is the most common form of stroke and the second most common cause of death and incapacity worldwide. Its pathogenesis and treatment have been the focus of considerable research.
Wenjuan Li +4 more
doaj +1 more source
Double binding energy differences: Mean-field or pairing effect?
In this paper we present a systematic analysis on the average interaction between the last protons and neutrons in atomic nuclei, which can be extracted from the double differences of nuclear binding energies.
Qi, Chong
core +1 more source
Automating VPN Configuration in Computer Networks
The configuration of security systems for communication protection, such as VPNs, is traditionally performed manually by human beings. However, because the complexity of this task becomes soon difficult to manage when its size increases, critical errors ...
Daniele Bringhenti +2 more
semanticscholar +1 more source

