|
|
|
Huiting Wang, Yazhi Liu, Wei Li and Zhigang Yang
In data center networks, when facing challenges such as traffic volatility, low resource utilization, and the difficulty of a single traffic scheduling strategy to meet demands, it is necessary to introduce intelligent traffic scheduling mechanisms to im...
ver más
|
|
|
|
|
|
|
Qiang Liu, Rui Han and Yang Li
Idle bandwidth resources are inefficiently distributed among different users. Currently, the utilization of user bandwidth resources mostly relies on traditional IP networks, implementing relevant techniques at the application layer, which creates scalab...
ver más
|
|
|
|
|
|
|
Haobin Xu, Linxiao Fu, Jinnian Li, Xiaoyu Lin, Lingxiao Chen, Fenglin Zhong and Maomao Hou
Nonheading Chinese cabbage is an important leafy vegetable, and quantitative identification and automated analysis of nonheading Chinese cabbage leaves are crucial for cultivating new varieties with higher quality, yield, and resistance. Traditional leaf...
ver más
|
|
|
|
|
|
|
Fahad Alqahtani, Mohammed Almutairi and Frederick T. Sheldon
This study provides a comprehensive review and comparative analysis of existing Information Flow Tracking (IFT) tools which underscores the imperative for mitigating data leakage in complex cloud systems. Traditional methods impose significant overhead o...
ver más
|
|
|
|
|
|
|
Vladimir Modrak, Zuzana Soltysova and Julia Nazarejova
As mass customization becomes more pervasive in many sectors, researchers need to update traditional approaches to the optimization of critical performance and design parameters in order to help companies in their effort to implement this strategy. In ge...
ver más
|
|
|
|
|
|
|
Hongyu Liu, Hong Ni and Rui Han
The control of transmission rates is currently a major topic in network research, as it plays a significant role in determining network performance. Traditional network design principles suggest that network nodes should only be responsible for forwardin...
ver más
|
|
|
|
|
|
|
Argyrios Sideris, Theodora Sanida and Minas Dasygenis
Hash functions are an essential mechanism in today?s world of information security. It is common practice to utilize them for storing and verifying passwords, developing pseudo-random sequences, and deriving keys for various applications, including milit...
ver más
|
|
|
|
|
|
|
João Pedro Vitorino, José Simão, Nuno Datia and Matilde Pato
This paper presents IRONEDGE, an architectural framework that can be used in different edge Stream Processing solutions for ?Smart Infrastructure? scenarios, on a case-by-case basis. The architectural framework identifies the common components that any s...
ver más
|
|
|
|
|
|
|
Zhiyuan Wang, Hong Ni and Rui Han
As the Internet communication model changes from host-centric to content-centric, information-centric networking (ICN) as a new network architecture has received increasing attention. There are often multiple replicas of content in ICN, and how to reason...
ver más
|
|
|
|
|
|
|
Argyrios Sideris and Minas Dasygenis
Information is transmitted between multiple insecure routing hops in text, image, video, and audio. Thus, this multi-hop digital data transfer makes secure transmission with confidentiality and integrity imperative. This protection of the transmitted dat...
ver más
|
|
|
|