Software-defined networking: A comprehensive survey

D Kreutz, FMV Ramos, PE Verissimo… - Proceedings of the …, 2014 - ieeexplore.ieee.org
The Internet has led to the creation of a digital society, where (almost) everything is
connected and is accessible from anywhere. However, despite their widespread adoption …

A survey on hyperdimensional computing aka vector symbolic architectures, part ii: Applications, cognitive models, and challenges

D Kleyko, D Rachkovskij, E Osipov, A Rahimi - ACM Computing Surveys, 2023 - dl.acm.org
This is Part II of the two-part comprehensive survey devoted to a computing framework most
commonly known under the names Hyperdimensional Computing and Vector Symbolic …

Preventing verbatim memorization in language models gives a false sense of privacy

D Ippolito, F Tramèr, M Nasr, C Zhang… - arxiv preprint arxiv …, 2022 - arxiv.org
Studying data memorization in neural language models helps us understand the risks (eg, to
privacy or copyright) associated with models regurgitating training data and aids in the …

Flchain: A blockchain for auditable federated learning with trust and incentive

X Bao, C Su, Y **ong, W Huang… - 2019 5th International …, 2019 - ieeexplore.ieee.org
Federated learning (shorted as FL) recently proposed by Google is a privacy-preserving
method to integrate distributed data trainers. FL is extremely useful due to its ensuring …

Vector symbolic architectures as a computing framework for emerging hardware

D Kleyko, M Davies, EP Frady, P Kanerva… - Proceedings of the …, 2022 - ieeexplore.ieee.org
This article reviews recent progress in the development of the computing framework vector
symbolic architectures (VSA)(also known as hyperdimensional computing). This framework …

Optimizing bloom filter: Challenges, solutions, and comparisons

L Luo, D Guo, RTB Ma… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Bloom filter (BF) has been widely used to support membership query, ie, to judge whether a
given element x is a member of a given set S or not. Recent years have seen a flourish …

Named data networking: a survey

D Saxena, V Raychoudhury, N Suri, C Becker… - Computer Science …, 2016 - Elsevier
Internet was developed as a packet data network where users and data sources (server)
with specific IP addresses interacted over a pre-established communication channel. This …

Monkey: Optimal navigable key-value store

N Dayan, M Athanassoulis, S Idreos - Proceedings of the 2017 ACM …, 2017 - dl.acm.org
In this paper, we show that key-value stores backed by an LSM-tree exhibit an intrinsic trade-
off between lookup cost, update cost, and main memory footprint, yet all existing designs …

Dostoevsky: Better space-time trade-offs for LSM-tree based key-value stores via adaptive removal of superfluous merging

N Dayan, S Idreos - Proceedings of the 2018 International Conference …, 2018 - dl.acm.org
In this paper, we show that all mainstream LSM-tree based key-value stores in the literature
and in industry are suboptimal with respect to how they trade off among the I/O costs of …

UAV-empowered edge computing environment for cyber-threat detection in smart vehicles

S Garg, A Singh, S Batra, N Kumar, LT Yang - IEEE network, 2018 - ieeexplore.ieee.org
Over the last few years, we have witnessed an exponential increase in the computing and
storage capabilities of smart devices that has led to the popularity of an emerging …