Redirigiendo al acceso original de articulo en 19 segundos...
Inicio  /  Information  /  Vol: 9 Núm: 3 Par: March (2018)  /  Artículo
ARTÍCULO
TITULO

On the Performance of the Cache Coding Protocol

Behnaz Maboudi    
Hadi Sehat    
Peyman Pahlevani and Daniel E. Lucani    

Resumen

-

 Artículos similares

       
 
Satwik Kundu, Rupshali Roy, M. Saifur Rahman, Suryansh Upadhyay, Rasit Onur Topaloglu, Suzanne E. Mohney, Shengxi Huang and Swaroop Ghosh    
The size of transistors has drastically reduced over the years. Interconnects have likewise also been scaled down. Today, conventional copper (Cu)-based interconnects face a significant impediment to further scaling since their electrical conductivity de... ver más

 
Hongseob Bae and Jaesung Park    
Optimizingthe cache hit rate in a multi-access edge computing (MEC) system is essential in increasing the utility of a system. A pivotal challenge within this context lies in predicting the popularity of a service. However, accurately predicting popular ... ver más
Revista: Applied Sciences

 
Muhammad Sheraz, Shahryar Shafique, Sohail Imran, Muhammad Asif, Rizwan Ullah, Muhammad Ibrar, Jahanzeb Khan and Lunchakorn Wuttisittikulkij    
Data caching has emerged as a promising technique to handle growing data traffic and backhaul congestion of wireless networks. However, there is a concern regarding how and where to place contents to optimize data access by the users. Data caching can be... ver más
Revista: Applied Sciences

 
Ye Chi, Haikun Liu, Ganwei Peng, Xiaofei Liao and Hai Jin    
Non-volatile memories (NVMs) have aroused vast interest in hybrid memory systems due to their promising features of byte-addressability, high storage density, low cost per byte, and near-zero standby energy consumption. However, since NVMs have limited w... ver más
Revista: Applied Sciences

 
Souhail Meftah, Shuhao Zhang, Bharadwaj Veeravalli and Khin Mi Mi Aung    
The appealing properties of secure hardware solutions such as trusted execution environment (TEE) including low computational overhead, confidentiality guarantee, and reduced attack surface have prompted considerable interest in adopting them for secure ... ver más
Revista: Algorithms