Redirigiendo al acceso original de articulo en 22 segundos...
Inicio  /  Information  /  Vol: 9 Núm: 3 Par: March (2018)  /  Artículo
ARTÍCULO
TITULO

On the Performance of the Cache Coding Protocol

Behnaz Maboudi    
Hadi Sehat    
Peyman Pahlevani and Daniel E. Lucani    

Resumen

-

 Artículos similares

       
 
Kyungwoon Lee, Jeongsu Kim, Ik-Hyeon Kwon, Hyunchan Park and Cheol-Ho Hong    
Containers enable high performance and easy deployment due to their lightweight architecture, thus facilitating resource utilization in edge computing nodes. Secure container runtimes have attracted significant attention because of the necessity for over... ver más
Revista: Applied Sciences

 
Hongseob Bae and Jaesung Park    
Optimizingthe cache hit rate in a multi-access edge computing (MEC) system is essential in increasing the utility of a system. A pivotal challenge within this context lies in predicting the popularity of a service. However, accurately predicting popular ... ver más
Revista: Applied Sciences

 
Muhammad Sheraz, Shahryar Shafique, Sohail Imran, Muhammad Asif, Rizwan Ullah, Muhammad Ibrar, Jahanzeb Khan and Lunchakorn Wuttisittikulkij    
Data caching has emerged as a promising technique to handle growing data traffic and backhaul congestion of wireless networks. However, there is a concern regarding how and where to place contents to optimize data access by the users. Data caching can be... ver más
Revista: Applied Sciences

 
Ye Chi, Haikun Liu, Ganwei Peng, Xiaofei Liao and Hai Jin    
Non-volatile memories (NVMs) have aroused vast interest in hybrid memory systems due to their promising features of byte-addressability, high storage density, low cost per byte, and near-zero standby energy consumption. However, since NVMs have limited w... ver más
Revista: Applied Sciences

 
Souhail Meftah, Shuhao Zhang, Bharadwaj Veeravalli and Khin Mi Mi Aung    
The appealing properties of secure hardware solutions such as trusted execution environment (TEE) including low computational overhead, confidentiality guarantee, and reduced attack surface have prompted considerable interest in adopting them for secure ... ver más
Revista: Algorithms