Feedback directed prefetching: Improving the performance and bandwidth-efficiency of hardware prefetchers
High performance processors employ hardware data prefetching to reduce the negative
performance impact of large main memory latencies. While prefetching improves …
performance impact of large main memory latencies. While prefetching improves …
Optimal controller placement in Software Defined Networks (SDN) using a non-zero-sum game
In this paper, we discuss optimal controller placement for Software Defined Networks (SDN)
and propose a non-zero-sum game based distributed technique. Our proposed technique is …
and propose a non-zero-sum game based distributed technique. Our proposed technique is …
Dimension in complexity classes
JH Lutz - SIAM Journal on Computing, 2003 - SIAM
A theory of resource-bounded dimension is developed using gales, which are natural
generalizations of martingales. When the resource bound Δ (a parameter of the theory) is …
generalizations of martingales. When the resource bound Δ (a parameter of the theory) is …
Policy-based management: A historical perspective
R Boutaba, I Aib - Journal of Network and Systems Management, 2007 - Springer
This paper traces the history of policy-based management and how it evolved from the first
security models dating back to the late 1960's until today's more elaborate frameworks …
security models dating back to the late 1960's until today's more elaborate frameworks …
Service function registration mechanism and capability indexing
L Dunbar, H Zhang - US Patent 10,587,698, 2020 - Google Patents
A method implemented in a network engine comprising receiving, by a service function (SF)
orchestrator in the network engine, a registration request message from a third-party SF …
orchestrator in the network engine, a registration request message from a third-party SF …
[書籍][B] Technologies for the Wireless Future, Volume 2: Wireless World Research Forum (WWRF)
R Tafazolli - 2006 - books.google.com
This fully updated second volume of the highly successful WWRF Book of Visions is a
unique and timely book, presenting up-to-the-minute ideas and trends in mobile …
unique and timely book, presenting up-to-the-minute ideas and trends in mobile …
A survey of policy refinement methods as a support for sustainable networks
Green sustainability-oriented features have become common in network nodes and
protocols. Running a network in an energy-efficient way is an important concern of network …
protocols. Running a network in an energy-efficient way is an important concern of network …
[書籍][B] Software-Defined networking and security: from theory to practice
This book provides readers insights into cyber maneuvering or adaptive and intelligent
cyber defense. It describes the required models and security supporting functions that …
cyber defense. It describes the required models and security supporting functions that …
Policy-based mobile ad hoc network management
Ad hoc networking is the basis of the future military network-centric warfare architecture.
Such networks are highly dynamic in nature, as mobile ad hoc networks are formed over …
Such networks are highly dynamic in nature, as mobile ad hoc networks are formed over …
Agile network access control in the container age
C Diekmann, J Naab, A Korsten… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Linux containers, such as those managed by Docker, are an increasingly popular way to
package and deploy complex applications. However, the fundamental security primitive of …
package and deploy complex applications. However, the fundamental security primitive of …