|
|
|
Kyungwoon Lee, Jeongsu Kim, Ik-Hyeon Kwon, Hyunchan Park and Cheol-Ho Hong
Containers enable high performance and easy deployment due to their lightweight architecture, thus facilitating resource utilization in edge computing nodes. Secure container runtimes have attracted significant attention because of the necessity for over...
ver más
|
|
|
|
|
|
Hongseob Bae and Jaesung Park
Optimizingthe cache hit rate in a multi-access edge computing (MEC) system is essential in increasing the utility of a system. A pivotal challenge within this context lies in predicting the popularity of a service. However, accurately predicting popular ...
ver más
|
|
|
|
|
|
Muhammad Sheraz, Shahryar Shafique, Sohail Imran, Muhammad Asif, Rizwan Ullah, Muhammad Ibrar, Jahanzeb Khan and Lunchakorn Wuttisittikulkij
Data caching has emerged as a promising technique to handle growing data traffic and backhaul congestion of wireless networks. However, there is a concern regarding how and where to place contents to optimize data access by the users. Data caching can be...
ver más
|
|
|
|
|
|
Ye Chi, Haikun Liu, Ganwei Peng, Xiaofei Liao and Hai Jin
Non-volatile memories (NVMs) have aroused vast interest in hybrid memory systems due to their promising features of byte-addressability, high storage density, low cost per byte, and near-zero standby energy consumption. However, since NVMs have limited w...
ver más
|
|
|
|
|
|
Souhail Meftah, Shuhao Zhang, Bharadwaj Veeravalli and Khin Mi Mi Aung
The appealing properties of secure hardware solutions such as trusted execution environment (TEE) including low computational overhead, confidentiality guarantee, and reduced attack surface have prompted considerable interest in adopting them for secure ...
ver más
|
|
|