Showing 41 - 60 results of 79 for search 'Cache (computing)', query time: 0.06s Refine Results
  1. 41

    Retracted: Computer Medical Image Segmentation Based on Neural Network by Xiaopeng Wang, Lei Gu, Zhongyi Wang

    Published 2020-01-01
    “…We then applied the method to a computer-aided system to classify tumor lesions in mammograms. …”
    Get full text
    Article
  2. 42

    SAPA-based approach for defending DoS attacks in cloud computing by Meng YUE, Kun LI, Zhi-jun WU

    Published 2017-04-01
    “…Denial of service (DoS) attack was one of the major threats to cloud computing.Security access path algorithm (SAPA) used node route table (NRT) to compose security access path.It simplified role nodes of traditional secure overlay services (SOS),and periodically updated role nodes,and cached security access paths.Therefore,SAPA was more appropriate for cloud computing to defend DoS attacks.Based on the turn routing architecture of cloud computing,the mathematical model of SAPA was built and its performance was analyzed in theory.The performance of SAPA was tested in OMNeT++ experimental platform.Also,the Test-bed experiments were performed to evaluate the effectiveness of SAPA for defending DoS attack.Experimental results show that comparing with SOS,SAPA can degrade the impact of communication success rate caused by DoS attack effectively,and guarantees the access delay small enough.…”
    Get full text
    Article
  3. 43

    A Novel Cost Based Model for Energy Consumption in Cloud Computing by A. Horri, Gh. Dastghaibyfard

    Published 2015-01-01
    “…To support green cloud computing, providers also need to minimize cloud infrastructure energy consumption while conducting the QoS. …”
    Get full text
    Article
  4. 44

    Exploring In-Network Computing with Information-Centric Networking: Review and Research Opportunities by Marica Amadeo, Giuseppe Ruggeri

    Published 2025-01-01
    “…In-network computing (INC) offers a transformative solution by integrating computational capabilities directly into the network fabric, enabling dynamic and distributed task execution. …”
    Get full text
    Article
  5. 45

    Design and application research on management information system security architecture in digital campus by Xin-zheng LONG, Cheng-jie XING, Rong-bin OUYANG, Qian-yi WANG, Li LI, Yun-feng LIU

    Published 2014-10-01
    “…Aiming at the university management information system security threats and challenges,a security architecture named 1C4GS was proposed.First connotation and function of five important components of 1C4GS was expounded,which named security management center,security communication network,security region boundary,security computing environment and security application.Then we used “basic personal data reporting system” as an example to construct the management information system security arrangement application based on 1C4AS,this arrangement application integrated a variety of security technologies and strategies such as transparent data encryption,user Identify,form edit cache as a whole to,and achieved the management information system’s network security,border security,computing environment security and application security.…”
    Get full text
    Article
  6. 46

    Joint optimization method of intelligent service arrangement and computing-networking resource allocation for MEC by Yun LI, Qian GAO, Zhixiu YAO, Shichao XIA, Jishen LIANG

    Published 2023-07-01
    “…To solve the problems of low efficiency of network service caching and computing-networking resource allocation caused by tasks differentiation, highly dynamic network environment, and decentralized computing-networking resource deployment in edge networks, a decentralized service arrangement and computing offloading model for mobile edge computing was investigated and established.Considering the multidimensional resource constraints, e.g., computing power, storage, and bandwidth, with the objective of minimizing task processing latency, the joint optimization of service caching and computing-networking resource allocation was abstracted as a partially observable Markov decision process.Considering the temporal dependency of service request and its coupling relationship with service caching, a long short-term memory network was introduced to capture time-related network state information.Then, based on recurrent multi-agent deep reinforcement learning, a distributed service arrangement and resource allocation algorithm was proposed to autonomously decide service caching and computing-networking resource allocation strategies.Simulation results demonstrate that significant performance improvements in terms of cache hit rate and task processing latency achieved by the proposed algorithm.…”
    Get full text
    Article
  7. 47

    Tuning block-parallel all-pairs shortest path algorithm for efficient multi-core implementation by O. N. Karasik, A. A. Prihozhy

    Published 2022-12-01
    “…The technique involves profiling tools in the tuning process and allows the increase of the parallel algorithm throughput. Computational experiments carried out on a rack server equipped with two Intel Xeon E5-2620 v4 processors of 8 cores and 16 hardware threads each have convincingly shown for various graph sizes that the behavior and parameters of the hierarchical cache memory operation don’t depend on the graph size and are determined only by the distance matrix’s block size. …”
    Get full text
    Article
  8. 48

    Refactoring BZIP2 on the new‐generation sunway supercomputer by Xiaohui Liu, Zekun Yin, Haodong Tian, Wubing Wan, Mengyuan Hua, Wenlai Zhao, Zhenchun Huang, Ping Gao, Fangjin Zhu, Hua Wang, Xiaohui Duan

    Published 2025-01-01
    “…Abstract High‐performance computing is progressively assuming a fundamental role in advancing scientific research and engineering domains. …”
    Get full text
    Article
  9. 49

    CSRouter:router architecture for service extensibility by Gao-feng LV, Zhi-gang SUN, Yu-xian LIN, Yi-jiao CHEN, Tao LI

    Published 2012-07-01
    “…The development of network applications ,network end-end“channel”for data transmission impeded applications,network“platform”integrating computing and storing resource with routers is a considerable efficient means to enhance the efficiency of the network transport.System area network of routers based on high performance unified switching technology is introduced to connect forwarding elements,computing elements and storing elements.The prototype were designed and implemented based on the NetMagic platform of network innovation and the IEF switch system.The testing of packets caching proves that system area network provides high performance and high reliability network bandwidths between forwarding elements and computing elements,and the novel router architecture based on system area network could utilize additional computing and storing resources to process IP packet in depth to accelerate network applications.…”
    Get full text
    Article
  10. 50

    Reviews of D2D technology for 5G communication networks by Zhi-hong QIAN, Xue WANG

    Published 2016-07-01
    “…What emerges is that still major issues shall be faced by the research community, as D2D, SDN, edge computing and IOT technologies are expected to be introduced into the future mobile communication networks. …”
    Get full text
    Article
  11. 51

    Research on location privacy protection of mobile terminals for maritime monitoring sensor networks by Xin SU, Su JIANG, Yiqing ZHOU

    Published 2021-12-01
    “…Mobile edge computing can support various maritime applications with high reliability and low delay.However, many security problems in computing task offloading exist.The risk of location privacy leakage of maritime mobile terminals during task offloading was analyzed and quantified.The related location privacy protection model was established and a dynamic cache and spatial cloaking-based location privacy protection (DS-LPP) algorithm was proposed.Simulation results show that DS-LPP algorithm has better performance of constructing anonymous space and selecting relay node than traditional algorithms while protecting the location privacy of maritime mobile terminals.Therefore, the DS-LPP algorithm can be effectively applied to maritime monitoring sensor network with relatively scanty communication and computing resources, and ensure the continuity of location privacy protection.…”
    Get full text
    Article
  12. 52

    Twinkle: A GPU-based Binary-lens Microlensing Code with the Contour Integration Method by Suwei Wang, Lile Wang, Subo Dong

    Published 2025-01-01
    “…We also devise an improved method for robustly identifying ghost images, thereby enhancing computational reliability. We have advanced the state of the art by optimizing Twinkle specifically for heterogeneous computing devices by taking into account the unique task and cache memory dispatching patterns of GPUs, while the compatibility with the traditional computing architectures of CPUs is still maintained. …”
    Get full text
    Article
  13. 53
  14. 54

    PCPIR-V:parallel privacy protected algorithms for nearest neighbor query based on Spark by Shi-zhuo DENG, Ji-tao YAO, Bo-tao WANG, Yue-mei CHEN, Ye YUAN, Yan-hui LI, Guo-ren WANG

    Published 2016-05-01
    “…To address the low-efficiency problem for query privacy protection on big data,parallel CPIR-V (PCPIR-V),which had a high level of privacy protection for nearest neighbor query,was presented and implemented based on spark.Two parallel strategies for PCPIR-V,Row strategy and Bit strategy,were proposed.To avoid redundant multiplications,the repeated products were cached based on a clustering technique while computing CPIR on Spark.According to the evaluation results of PCPIR-V on three datasets,the scalablity of PCPIR-V is good until the number of core is larger than 40.The cost of PCPIR-V with the method of caching partial multiplication results is reduced by 20% averagely.…”
    Get full text
    Article
  15. 55
  16. 56

    Differential Grey Wolf Load-Balanced Stochastic Bellman Deep Reinforced Resource Allocation in Fog Environment by S. V. Nethaji, M. Chidambaram

    Published 2022-01-01
    “…Fog computing is becoming a dynamic and sought-after computing prototype for Internet of Things (IoT) application deployments. …”
    Get full text
    Article
  17. 57
  18. 58

    Parallelizing the cryo‐EM structure determination in THUNDER using GPU cluster by Zhao Wang, Huabin Ruan, Guangwen Yang, Xueming Li

    Published 2025-01-01
    “…Here, we designed a new computing approach specialized for GPU to optimize and maximize the computing power of a single GPU, multiple GPU, and the GPU cluster, highlighted by a well‐designed cache structure and mixed computing precision of single‐precision and double‐precision. …”
    Get full text
    Article
  19. 59

    Resource Scheduling Algorithm Based on DQN in Satellite CDN by Jiaran ZHANG, Yating YANG, Tian SONG

    Published 2022-12-01
    “…With the rapid development of space and information fi eld, hot content distribution intensive scenes will become one of the key directions of satellite network application, and satellite content delivery network (CDN) network is an important means to improve the effi ciency of air and space content distribution.In the architecture of satellite CDN network, due to the uneven time and space of business requirements, the scarcity of satellite resources and the insuffi cient adaptability of existing scheduling algorithms, scheduling algorithms for satellite resources are faced with problems such as high resource dimension, many computing states and large amount of computation, which will reduce the accuracy, response speed and computing performance of scheduling decisions.To solve this problem, a resource scheduling algorithm based on Deep Q-Learning (DQN) algorithm was proposed to improved the effi ciency and accuracy of satellite resource scheduling, and intelligently and quickly perceived the resource situation to make scheduling decisions.Firstly, the user requests were classifi ed, and the shortest path set that the satellite could communicated with was calculated according to the time-varying trajectory of the satellite and the resources of the satellite and the ground.After that, the related information of satellites and users was quantifi ed by Markov model modeling, and the optimal CDN storage node of satellites was calculated by DQN algorithm, which achieved the eff ects of reduced user request delay, reduced satellite-ground resource occupancy rate and improved cache hit rate.…”
    Get full text
    Article
  20. 60

    Task scheduling optimization strategy for roadside unit based on security strength by SU Beipo, DAI Liang, JU Yongfeng

    Published 2024-04-01
    “…In the context of cooperative vehicle-infrastructure systems (CVIS), vehicles often offload computational tasks to roadside units (RSUs) for execution due to their own constrained computing resources. …”
    Get full text
    Article