Feedback directed prefetching: Improving the performance and bandwidth-efficiency of hardware prefetchers

S Srinath, O Mutlu, H Kim… - 2007 IEEE 13th …, 2007 - ieeexplore.ieee.org
High performance processors employ hardware data prefetching to reduce the negative
performance impact of large main memory latencies. While prefetching improves …

Optimal controller placement in Software Defined Networks (SDN) using a non-zero-sum game

HK Rath, V Revoori, SM Nadaf… - Proceeding of IEEE …, 2014 - ieeexplore.ieee.org
In this paper, we discuss optimal controller placement for Software Defined Networks (SDN)
and propose a non-zero-sum game based distributed technique. Our proposed technique is …

Dimension in complexity classes

JH Lutz - SIAM Journal on Computing, 2003 - SIAM
A theory of resource-bounded dimension is developed using gales, which are natural
generalizations of martingales. When the resource bound Δ (a parameter of the theory) is …

Policy-based management: A historical perspective

R Boutaba, I Aib - Journal of Network and Systems Management, 2007 - Springer
This paper traces the history of policy-based management and how it evolved from the first
security models dating back to the late 1960's until today's more elaborate frameworks …

Service function registration mechanism and capability indexing

L Dunbar, H Zhang - US Patent 10,587,698, 2020 - Google Patents
A method implemented in a network engine comprising receiving, by a service function (SF)
orchestrator in the network engine, a registration request message from a third-party SF …

[書籍][B] Technologies for the Wireless Future, Volume 2: Wireless World Research Forum (WWRF)

R Tafazolli - 2006 - books.google.com
This fully updated second volume of the highly successful WWRF Book of Visions is a
unique and timely book, presenting up-to-the-minute ideas and trends in mobile …

A survey of policy refinement methods as a support for sustainable networks

AC Riekstin, GC Januario, BB Rodrigues… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
Green sustainability-oriented features have become common in network nodes and
protocols. Running a network in an energy-efficient way is an important concern of network …

[書籍][B] Software-Defined networking and security: from theory to practice

D Huang, A Chowdhary, S Pisharody - 2018 - taylorfrancis.com
This book provides readers insights into cyber maneuvering or adaptive and intelligent
cyber defense. It describes the required models and security supporting functions that …

Policy-based mobile ad hoc network management

R Chadha, H Cheng, YH Cheng… - … on Policies for …, 2004 - ieeexplore.ieee.org
Ad hoc networking is the basis of the future military network-centric warfare architecture.
Such networks are highly dynamic in nature, as mobile ad hoc networks are formed over …

Agile network access control in the container age

C Diekmann, J Naab, A Korsten… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Linux containers, such as those managed by Docker, are an increasingly popular way to
package and deploy complex applications. However, the fundamental security primitive of …