-
1
Joint optimization of edge computing and caching in NDN
Published 2022-08-01Subjects: Get full text
Article -
2
Future network model for integrated collaboration of communication, computing, caching and intelligence
Published 2024-05-01“…In order to adapt to the demands of diverse businesses for on-demand, accurate and efficient network services, the communication-computing-caching-intelligence cooperative network (3CI-CoNet) was proposed. …”
Get full text
Article -
3
Research on mobile edge computing and caching in massive wireless communication network
Published 2021-04-01Subjects: Get full text
Article -
4
Joint intelligent optimization of task offloading and service caching for vehicular edge computing
Published 2021-01-01Subjects: Get full text
Article -
5
IMSC: Instruction set architecture monitor and secure cache for protecting processor systems from undocumented instructions
Published 2022-07-01“…To address this problem that may cause potentially serious security breaches, the instruction set architecture (ISA) monitor and secure cache (IMSC) is proposed. As a lightweight solution, IMSC employs an ISA monitor to discover and correct any potential threats imposed by undocumented instructions, and it relies on a secure cache to ensure the credibility of the system. …”
Get full text
Article -
6
Joint optimization strategy of service cache and resource allocation in mobile edge network
Published 2023-01-01Subjects: “…mobile edge computing…”
Get full text
Article -
7
Data cache optimization model based on cyclic genetic ant colony algorithm in edge computing environment
Published 2019-08-01“…Edge computing has recently emerged as an important paradigm to bring filtering, processing, and caching resources to the edge of networks. …”
Get full text
Article -
8
Energy-Efficient Aerial STAR-RIS-Aided Computing Offloading and Content Caching for Wireless Sensor Networks
Published 2025-01-01Subjects: Get full text
Article -
9
V2X collaborative caching and resource allocation in MEC-based IoV
Published 2021-02-01Subjects: Get full text
Article -
10
Research and Achievement of Redundancy Elimination of Backbone Network
Published 2013-09-01Subjects: “…computer network…”
Get full text
Article -
11
Research on incentive mechanism for mobile intelligent edge computing
Published 2019-06-01Subjects: “…mobile intelligent edge computing…”
Get full text
Article -
12
Toward Fine-Grained Partitioning of Low-Level SRAM Caches for Emerging 3D-IC Designs
Published 2024-01-01Get full text
Article -
13
-
14
Fog computing based radio access networks:architecture,principles and challenges
Published 2016-06-01Subjects: Get full text
Article -
15
Cache of cryptographic key based on query popularity
Published 2023-02-01“…In the current HDFS (Hadoop Distributed File System) key management system, the encryption zone keys are all loaded into the memory during startup of key service.With the increase of the key resource, the occupied memory space also grows, bringing the bottleneck of memory space and key indexing.There are three challenges induced: how to organize cached data and efficiently handle queries with missed keys, how to adjust key resources in the cache, and how to accurately predict the use of keys.In order to achieve fine-grained and efficient caching and improve the efficiency of key use, key caching optimization was considered from three aspects: key index data structure, key replacement algorithm, and key prefetching strategy.An architecture of key cache replacement module was designed, and then a key replacement algorithm based on the query frequency was set.Specifically, from the perspective of heat computing and key replacement, the potential influencing factors affecting the popularity of key cache were analyzed which considered the file system and user of key management system.Besides, the basic model of key usage popularity was constructed.The hash table and minheap linked list was combined to maintain the heat of the key in use, and the elimination algorithm was set based on heat identification.The key in the cache was dynamically updated, and key usage was adjusted by the time controller, so as to realize key replacement according to the key heat.For key prefetching, key usage rules were obtained through log mining and periodical usage analyzing of key provisioning policies, which considered business processes and the time period dimension of user accessing.Experimental results show that the proposed key replacement algorithm can effectively improve the hit rate of cache queries, reduce memory usage, and ameliorate the impact of key file I/O interaction on query performance.…”
Get full text
Article -
16
Multi-objective optimal offloading decision for cloud-edge collaborative computing scenario in Internet of vehicles
Published 2022-06-01“…In this architecture, vehicle terminals, cloud servers and edge servers could provide computing services. The cache strategy was introduced into the scenario of Internet of vehicles by classifying cache tasks. …”
Get full text
Article -
17
THE IMPACT ANALYSIS OF PREFETCH IN THE CACHE ON THE MICROPROCESSOR PERFORMANCE
Published 2016-04-01“…Cache prefetching method is one of the basic ones to give the most effective use of memory cache. …”
Get full text
Article -
18
-
19
Research on Load Balancing and Caching Strategy for Central Network
Published 2022-01-01Get full text
Article -
20
Joint security and performance improvement in multilevel shared caches
Published 2021-07-01Get full text
Article