Redirigiendo al acceso original de articulo en 24 segundos...
Inicio  /  Information  /  Vol: 9 Núm: 3 Par: March (2018)  /  Artículo
ARTÍCULO
TITULO

On the Performance of the Cache Coding Protocol

Behnaz Maboudi    
Hadi Sehat    
Peyman Pahlevani and Daniel E. Lucani    

Resumen

-

 Artículos similares

       
 
Peiyan Yuan, Ming Li, Shuhong Li, Chunhong Liu and Xiaoyan Zhao    
Edge networks employ local computing and caching resources to process data, thus alleviating the bandwidth pressure on backbone networks and improve users? quality of experience. System capacity is one of the key metrics to evaluate the performance of ed... ver más
Revista: Applied Sciences

 
Hongseob Bae and Jaesung Park    
Optimizingthe cache hit rate in a multi-access edge computing (MEC) system is essential in increasing the utility of a system. A pivotal challenge within this context lies in predicting the popularity of a service. However, accurately predicting popular ... ver más
Revista: Applied Sciences

 
Muhammad Sheraz, Shahryar Shafique, Sohail Imran, Muhammad Asif, Rizwan Ullah, Muhammad Ibrar, Jahanzeb Khan and Lunchakorn Wuttisittikulkij    
Data caching has emerged as a promising technique to handle growing data traffic and backhaul congestion of wireless networks. However, there is a concern regarding how and where to place contents to optimize data access by the users. Data caching can be... ver más
Revista: Applied Sciences

 
Ye Chi, Haikun Liu, Ganwei Peng, Xiaofei Liao and Hai Jin    
Non-volatile memories (NVMs) have aroused vast interest in hybrid memory systems due to their promising features of byte-addressability, high storage density, low cost per byte, and near-zero standby energy consumption. However, since NVMs have limited w... ver más
Revista: Applied Sciences

 
Souhail Meftah, Shuhao Zhang, Bharadwaj Veeravalli and Khin Mi Mi Aung    
The appealing properties of secure hardware solutions such as trusted execution environment (TEE) including low computational overhead, confidentiality guarantee, and reduced attack surface have prompted considerable interest in adopting them for secure ... ver más
Revista: Algorithms