Improving big data centers energy efficiency: Traffic based model and method
Green aspects of data centers (DCs) which provide the appropriate hosting services and
data storage are considered. Various approaches to transmission control of integrated data …
data storage are considered. Various approaches to transmission control of integrated data …
Fast and flexible: Parallel packet processing with GPUs and click
W Sun, R Ricci - Architectures for Networking and …, 2013 - ieeexplore.ieee.org
We introduce Snap, a framework for packet processing that outperforms traditional software
routers by exploiting the parallelism available on modern GPUs. While obtaining high …
routers by exploiting the parallelism available on modern GPUs. While obtaining high …
Multiservice network security metric
This report proposes a new approach to determination of security complex metric. Such
approach allows to obtain a quantitative assess based on network security recorded …
approach allows to obtain a quantitative assess based on network security recorded …
Resource-oriented approaches to implementation of traffic control technologies in safety-critical I&C systems
Abstract Changes in approaches to safety-critical Instrumentation and Control (I&C) systems
traffic control results in changes in system power consumption. Thus, timely detection of …
traffic control results in changes in system power consumption. Thus, timely detection of …
Researching and designing of the dynamic adaptive queue balancing method on telecommunication network routers
O Lemeshko, M Semenyaka… - 2013 12th International …, 2013 - ieeexplore.ieee.org
The paper presents the dynamic adaptive queue balancing method that was designed for
solving queues balancing problem on the telecommunication network routers. Within the …
solving queues balancing problem on the telecommunication network routers. Within the …
VPN–Based WiMAX Network Protection Against Jamming Attacks for VoIP Application
SW Nourildean, SY Ameen… - Journal of Physics …, 2022 - iopscience.iop.org
WiMAX technology with up to 30 miles of coverage compared to other technologies is more
vulnerable to jamming attacks, and therefore, the security issue was a major concern. The …
vulnerable to jamming attacks, and therefore, the security issue was a major concern. The …
Researching of mathematical models based on optimal control approaches for congestion control in telecommunication network
AV Lemeshko, MV Semenyaka - East-West Design & Test …, 2013 - ieeexplore.ieee.org
The paper presents the flow-based models that were designed for solving dynamic queues
balancing problem on the telecommunication network routers. Within the models the …
balancing problem on the telecommunication network routers. Within the models the …
[PDF][PDF] An Empirical Study and the Road Ahead of IEEE 802.16.
IEEE 802.16, also known as WiMAX is a commonly used broadband wireless access
scheme worldwide. This paper presented a survey of research done in the MAC layer of the …
scheme worldwide. This paper presented a survey of research done in the MAC layer of the …
Quality of service performance analysis for xgs-pon deployment in indonesia
N Solihah, MI Nashiruddin… - 2021 13th International …, 2021 - ieeexplore.ieee.org
This study evaluates the implementation of a scheduling mechanism in traffic handling to
support Quality of Service (QoS) in the network. The QoS aims to provide better network …
support Quality of Service (QoS) in the network. The QoS aims to provide better network …
Weighted Round Robin (WRR) Based Replenishment Model in Vendor Managed Inventory (VMI) System
PD Kusuma - International Journal of Integrated Engineering, 2022 - penerbit.uthm.edu.my
Vendor managed inventory (VMI) is a popular supply chain system where vendor or supplier
take responsibility and decision in managing its customers’ inventory. Two important …
take responsibility and decision in managing its customers’ inventory. Two important …