Showing 61 - 80 results of 80 for search 'Router (computing)', query time: 0.12s Refine Results
  1. 61

    Cyberspace Ecologism 4.0”: Between Software Softeners of and Hardware Hardships on the Natural Environment by Jora, O.D., Damoc, A.I., Roșca, V.I., Apăvăloaei, M.A., Iacob, M.

    Published 2022-02-01
    “…An amorphous world, hastily assimilated to the Internet, the cyberspace is the sum or, better said, the synergy created by links between computers (and other compatible devices), servers, routers and various items of global IT and telecommunications infrastructures. …”
    Get full text
    Article
  2. 62
  3. 63
  4. 64

    EMULATION OF SOFTWARE-DEFINED NETWORK USING MININET by Do Van Khoa, Tran Ngo Nhu Khanh

    Published 2021-02-01
    “…Most network devices such as routers and switches that implement SDN functionalities are expensive. …”
    Get full text
    Article
  5. 65
  6. 66
  7. 67

    WFQ ENHANCEMENT USING INTELLIGENT DISTRIBUTED QUEUE BASED ANFIS FOR PACKET SWITCHING NETWORK by Sh. A. Ali, K. A. Nassar

    Published 2019-06-01
    “…The main contributions of this paper are minimizing the delay, reduce the packet loss in routers service queue and increasing throughput. In order to enhance the performance of computer network.…”
    Get full text
    Article
  8. 68

    Real-Time Resource Allocation Algorithm for the Quasi-Two-Dimensional Mobile Delay/Disrupt Tolerant Networking by Ying Wang, Yonghui Zhang

    Published 2013-06-01
    “…However, schemes based on neural network and genetic algorithms are of computational complexity that is not applied to real-time applications. …”
    Get full text
    Article
  9. 69

    Real-Time Resource Allocation Algorithm for the Quasi-Two-Dimensional Mobile Delay/Disrupt Tolerant Networking by Ying Wang, Yonghui Zhang

    Published 2013-06-01
    “…However, schemes based on neural network and genetic algorithms are of computational complexity that is not applied to real-time applications. …”
    Get full text
    Article
  10. 70

    ECAE: An Efficient Certificateless Aggregate Signature Scheme Based on Elliptic Curves for NDN-IoT Environments by Cong Wang, Haoyu Wu, Yulong Gan, Rui Zhang, Maode Ma

    Published 2025-04-01
    “…However, existing signature schemes for NDN-IoT face dual challenges: resource-constrained IoT terminals struggle with certificate management and computationally intensive bilinear pairings under traditional Public Key Infrastructure (PKI), while NDN routers require low-latency batch verification for high-speed data forwarding. …”
    Get full text
    Article
  11. 71

    A Lightweight Caching Decision Strategy Based on Node Edge-Degree for Information Centric Networking by Qifeng Yang, Haojiang Deng, Lingfang Wang

    Published 2025-01-01
    “…They usually have huge computation overhead and cannot meet line-speed requirement. …”
    Get full text
    Article
  12. 72

    Advanced Persistent Threats and Wireless Local Area Network Security: An In-Depth Exploration of Attack Surfaces and Mitigation Techniques by Hosam Alamleh, Laura Estremera, Shadman Sakib Arnob, Ali Abdullah S. AlQahtani

    Published 2025-05-01
    “…A series of empirical experiments—ranging from traffic analysis of ISP-controlled routers to offline password attack modeling—evaluate the current resilience of WLANs and highlight specific vulnerabilities such as credential reuse, firmware-based leakage, and protocol downgrade attacks. …”
    Get full text
    Article
  13. 73

    CacheCraft: A Topology-Aware PageRank Centrality Algorithm for Cache Optimization in Named Data Networking by Ridha M. Negara, Nana R. Syambas, Eueung Mulyana, Rashid M. Fajri, Mochamad S. Budiana

    Published 2025-04-01
    “…Traditional NDN allocates CS capacity uniformly across routers, assuming equal storage requirements for all nodes. …”
    Get full text
    Article
  14. 74

    Enhancing Cyber Resilience Through Traffic Generation Patterns in Complex Networks: A Study on Cascading Failures by B. Aymar Le Pere Tchimwa, Jean-Pierre Lienou, Wilson Ejuh Geh, Frederica Nelson, Sachin Shetty, Charles Kamhoua

    Published 2024-01-01
    “…This paper investigates the resilience of communication networks with heterogeneous nodes, with host nodes that generate and receive packets and routers that only forward packets. We focus on how traffic generation patterns, defined as the distribution of data packet creation across hosts, affect network resilience. …”
    Get full text
    Article
  15. 75
  16. 76
  17. 77
  18. 78
  19. 79
  20. 80

    Failed Skew Zero Forcing Numbers of Path Powers and Circulant Graphs by Aidan Johnson, Andrew Vick, Rigoberto Flórez, Darren A. Narayan

    Published 2025-03-01
    “…The graphs we consider are where computers/routers or people are arranged in a linear or circular formation with varying proximities for contagion. …”
    Get full text
    Article