Software-defined networking: A comprehensive survey
The Internet has led to the creation of a digital society, where (almost) everything is
connected and is accessible from anywhere. However, despite their widespread adoption …
connected and is accessible from anywhere. However, despite their widespread adoption …
A survey on hyperdimensional computing aka vector symbolic architectures, part ii: Applications, cognitive models, and challenges
This is Part II of the two-part comprehensive survey devoted to a computing framework most
commonly known under the names Hyperdimensional Computing and Vector Symbolic …
commonly known under the names Hyperdimensional Computing and Vector Symbolic …
Preventing verbatim memorization in language models gives a false sense of privacy
Studying data memorization in neural language models helps us understand the risks (eg, to
privacy or copyright) associated with models regurgitating training data and aids in the …
privacy or copyright) associated with models regurgitating training data and aids in the …
Flchain: A blockchain for auditable federated learning with trust and incentive
X Bao, C Su, Y **ong, W Huang… - 2019 5th International …, 2019 - ieeexplore.ieee.org
Federated learning (shorted as FL) recently proposed by Google is a privacy-preserving
method to integrate distributed data trainers. FL is extremely useful due to its ensuring …
method to integrate distributed data trainers. FL is extremely useful due to its ensuring …
Vector symbolic architectures as a computing framework for emerging hardware
This article reviews recent progress in the development of the computing framework vector
symbolic architectures (VSA)(also known as hyperdimensional computing). This framework …
symbolic architectures (VSA)(also known as hyperdimensional computing). This framework …
Optimizing bloom filter: Challenges, solutions, and comparisons
Bloom filter (BF) has been widely used to support membership query, ie, to judge whether a
given element x is a member of a given set S or not. Recent years have seen a flourish …
given element x is a member of a given set S or not. Recent years have seen a flourish …
Named data networking: a survey
Internet was developed as a packet data network where users and data sources (server)
with specific IP addresses interacted over a pre-established communication channel. This …
with specific IP addresses interacted over a pre-established communication channel. This …
Monkey: Optimal navigable key-value store
In this paper, we show that key-value stores backed by an LSM-tree exhibit an intrinsic trade-
off between lookup cost, update cost, and main memory footprint, yet all existing designs …
off between lookup cost, update cost, and main memory footprint, yet all existing designs …
Dostoevsky: Better space-time trade-offs for LSM-tree based key-value stores via adaptive removal of superfluous merging
In this paper, we show that all mainstream LSM-tree based key-value stores in the literature
and in industry are suboptimal with respect to how they trade off among the I/O costs of …
and in industry are suboptimal with respect to how they trade off among the I/O costs of …
UAV-empowered edge computing environment for cyber-threat detection in smart vehicles
Over the last few years, we have witnessed an exponential increase in the computing and
storage capabilities of smart devices that has led to the popularity of an emerging …
storage capabilities of smart devices that has led to the popularity of an emerging …