MG-Join: A scalable join for massively parallel multi-GPU architectures

J Paul, S Lu, B He, CT Lau - … of the 2021 International Conference on …, 2021 - dl.acm.org
The recent scale-up of GPU hardware through the integration of multiple GPUs into a single
machine and the introduction of higher bandwidth interconnects like NVLink 2.0 has …

[PDF][PDF] Proportional-integral genetic algorithm controller for stability of TCP network

MQ Sulttan, MH Jaber, SW Shneen - International Journal of …, 2020 - academia.edu
The life development and increase the number of internet users imposed an increase in data
circulating on the internet network and then make the network more congestion. As a result …

[PDF][PDF] Energy-aware strategy for data forwarding in IoT ecosystem.

K Nagarathna - International Journal of Electrical & Computer …, 2020 - core.ac.uk
The Internet of Things (IoT) is looming technology rapidly attracting many industries and
drawing research attention. Although the scale of IoT-applications is very large, the …

[PDF][PDF] Preemptive modelling towards classifying vulnerability of DDoS attack in SDN environment

M Narender, BN Yuvaraju - International Journal of …, 2020 - pdfs.semanticscholar.org
Software-Defined Networking (SDN) has become an essential networking concept towards
escalating the networking capabilities that are highly demanded future internet system …

[PDF][PDF] Proportional-integral genetic algorithm controller for stability

SW Shneen - International Journal of Electrical and Computer …, 2020 - researchgate.net
Many of the techniques have been proposed in previous years illustrate a work of AQM|[24-
26], the oldest one is random early detection (RED)[27] which has been used to reducing the …

To Defeat DDoS Attacks in Cloud Computing Environment Using Software Defined Networking (SDN)

BN Yuvaraju, M Narender - … in Software Engineering: Proceedings of the …, 2020 - Springer
At present cloud computing environment, DDoS attacks have become a weapon for the
illegitimate user's as well as for the cyber terrorists. These attacks have the capability to …