Please login to be able to save your searches and receive alerts for new content matching your search criteria.
With the ever-increasing volume of data and the demand to analyze and comprehend it, graph processing has become an essential approach for solving complex problems in various domains, like social networks, bioinformatics, and finance. Despite the ...
Extending human societies into virtual space through the construction of a metaverse has been a long-term challenge in both industry and academia. Achieving this challenge is now closer than ever due to advances in computer systems, facilitating large-...
The ambition of this talk is to seed discussions around how cloud native technologies can help research on performance engineering, but also what are the interesting performance engineering challenges to solve with cloud native technologies.
Cloud ...
In this paper, we use Wireshark packet-level traces to study the performance of the Zoom network application. Our work is motivated by several anecdotal reports of Zoom performance problems on our campus network during the Fall 2021 semester. Through ...
Cloud Computing has revolutionized the information technology world and the application offering over the last two decades. At the same time recent trends in Network Function Virtualization (NFV) and Software-Defined Wide Area Networks (SD-WAN) and the ...
With the development of new network structures, how to quickly understand the network intentions expressed by users in natural language is very important. Aiming at the problem of feature sparseness and semantic ambiguity caused by the limited number of ...
During the design of 5G power Internet of Things (IoT), the clock sources for clock synchronization mainly come from IEEE 1588, satellite synchronization and local crystal oscillator synchronization. On the basis of unified time service, local clock ...
In this letter, we investigate the end-to-end (E2E) delay performance for mobile cyber-physical systems (M-CPS) with edge computing. The traditional delay analysis is based on flow conservation law, whereas the flow is not conserved in the M-CPS with ...
In this article, the energy-efficient computation offloading and resource allocation for satellite multi-access edge computing (MEC) is studied. The problem is formulated to minimize the sum energy consumption of users while ensuring the task tolerance ...
3D modeling is the process of creating and designing 3-dimensional objects used to represent real objects or physical environments. It is used for game development, information, educational and communication materials that are developed and deployed ...
The problem of constructing independent spanning trees (ISTs) dates back to as early as late 1980s. Given a network G of a certain topology, the question is whether we can, as well as how to, construct a set of independent spanning trees in G. ISTs have ...
Various opportunities are available to depict different domains due to the diverse nature of social networks and researchers' insatiable. An opinion leader is a human entity or cluster of people who can redirect human assessment strategy by intellectual ...
Agriculture-based Internet of Things (Ag-IoT) can generate near-real-time quantitative data to analyze crop growth. Unmanned Aerial Vehicle (UAV) based mobile edge computing systems is widely used in Ag-IoT due to the low cost, fast movement and ease of ...
As an essential component responsible for communication, network services are security-critical, and it is vital to find vulnerabilities in them. Fuzzing is currently one of the most popular software vulnerability discovery techniques, widely adopted due ...
Before the emergence of the Internet of Things (IoT) technology, the network physics system (CPS) used conventional Internet protocols (SOAP) to communicate with each other. However, these protocols have some shortcomings or deficiencies inherently: ...
Accurate and effective estimation of link quality can make nodes choose a more suitable node as the next hop when transmitting data and reduce the probability of packet retransmission to prolong the life of network. A link quality estimation method is ...
At present, microservice architecture has become the mainstream architecture of software system implementation. In the system built by microservices, multiple microservices must frequently communicate on the network. Due to the high network ...
Fog computing is a new, modern type of computing that distributes some of the storage, estimation, and processing constraints of cloud computing closer to the edge of the network. The impact of Cloud and Fog Computing in an educational context is now ...
A key issue in Wireless Powered Communications Network (WPCN), deployed for periodic sensor measurement reporting, is the design of the nodes’ transmission schedule process. Under various unfavorable conditions, such as distant nodes and/or nodes ...
Wireless Sensor Networks (WSN) are expected to revolutionize daily life by connecting everyday objects with sensing capabilities, offering numerous opportunities for a wide range of applications. To facilitate the integration and enable all these ...