Добірка наукової літератури з теми "In-network computing"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "In-network computing".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "In-network computing"
Gupta, Sachin. "Network Security in Cloud Computing." International Journal for Research in Applied Science and Engineering Technology 8, no. 11 (November 30, 2020): 636–41. http://dx.doi.org/10.22214/ijraset.2020.32244.
Повний текст джерелаWu, Yulei, Guojun Wang, and Ahmed Al-Dubai. "Advances in trusted network computing." Security and Communication Networks 7, no. 9 (May 30, 2014): 1311–12. http://dx.doi.org/10.1002/sec.1050.
Повний текст джерелаChen, Yu. "MEC Network Resource Allocation Strategy Based on Improved PSO in 5G Communication Network." International Journal on Semantic Web and Information Systems 19, no. 1 (August 18, 2023): 1–17. http://dx.doi.org/10.4018/ijswis.328526.
Повний текст джерелаProf. Krishnakumar L, Prof Krishnakumar L., and Nisha Mariam Varughese. "Intrusion Detection Using Collaborative Network Security Management System in Cloud Computing." Indian Journal of Applied Research 4, no. 3 (October 1, 2011): 145–47. http://dx.doi.org/10.15373/2249555x/mar2014/42.
Повний текст джерелаZheng, Changgang, Haoyue Tang, Mingyuan Zang, Xinpeng Hong, Aosong Feng, Leandros Tassiulas, and Noa Zilberman. "DINC: Toward Distributed In-Network Computing." Proceedings of the ACM on Networking 1, CoNEXT3 (November 27, 2023): 1–25. http://dx.doi.org/10.1145/3629136.
Повний текст джерелаHamdy, Noha, Amal Elsayed Aboutabl, Nahla ElHaggar, and Mostafa-Sami M. Mostafa. "Dynamic Task Scheduling Method in Cloud Computing Environment Using Optimized Neural Network." International Journal of Future Computer and Communication 6, no. 4 (December 2017): 143–47. http://dx.doi.org/10.18178/ijfcc.2017.6.4.507.
Повний текст джерелаXiaochun, Xu, Xu Guanghui, and Xu Yongsen. "Architectural issues in network-centric computing." ACM SIGSOFT Software Engineering Notes 27, no. 1 (January 2002): 53–57. http://dx.doi.org/10.1145/566493.1148030.
Повний текст джерелаFerrari, Adam. "JPVM: network parallel computing in Java." Concurrency: Practice and Experience 10, no. 11-13 (September 1998): 985–92. http://dx.doi.org/10.1002/(sici)1096-9128(199809/11)10:11/13<985::aid-cpe404>3.0.co;2-a.
Повний текст джерелаAlzahrani, Ali, Theyazn H. H. Aldhyani, Saleh Nagi Alsubari, and Ans D. Alghamdi. "Network Traffic Forecasting in Network Cybersecurity: Granular Computing Model." Security and Communication Networks 2022 (June 20, 2022): 1–14. http://dx.doi.org/10.1155/2022/3553622.
Повний текст джерелаMehibs, Shawq Malik, and Soukaena Hassan Hashim. "Proposed Network Intrusion Detection System In Cloud Environment Based on Back Propagation Neural Network." JOURNAL OF UNIVERSITY OF BABYLON for Pure and Applied Sciences 26, no. 1 (December 19, 2017): 29–40. http://dx.doi.org/10.29196/jub.v26i1.351.
Повний текст джерелаДисертації з теми "In-network computing"
Barros, Bruno Medeiros de. "Security architecture for network virtualization in cloud computing." Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/3/3141/tde-18012017-094453/.
Повний текст джерелаVirtualização de redes é uma área de pesquisa que tem ganho bastante atenção nos últimos anos, motivada pela necessidade de se implementar sistemas de comunicação seguros e de alta performance em infraestruturas de computação em nuvem. Em particular, os esforços de pesquisa nesta área têm levado ao desenvolvimento de soluções de segurança que visam aprimorar o isolamento entre os múltiplos inquilinos de sistemas de computação em nuvem públicos, uma demanda reconhecidamente crítica tanto pela comunidade acadêmica quanto pela indústria de tecnologia. Mais recentemente, o advento das Redes Definidas por Software (do inglês Software-Defined Networks - SDN) e da Virtualização de Funções de Rede (do inglês Network Function Virtualization - NFV) introduziu novos conceitos e técnicas que podem ser utilizadas para abordar questões de isolamento de redes virtualizadas em sistemas de computação em nuvem com múltiplos inquilinos, enquanto aprimoram a capacidade de gerenciamento e a flexibilidade de suas redes. Similarmente, tecnologias de virtualização assistida por hardware como Single Root I/O Virtualization - SR-IOV permitem a implementação do isolamento de recursos de hardware, melhorando o desempenho de redes físicas e virtualizadas. Com o intuito de implementar uma solução de virtualização de redes que aborda de maneira eficiente o problema de isolamento entre múltiplos inquilinos, nós apresentamos três estratégias complementares para o isolamento de recursos de rede em sistemas computação em nuvem. As estratégias apresentadas são então aplicadas na avaliação de arquiteturas de virtualização de rede existentes, revelando lacunas de segurança associadas às tecnologias utilizadas atualmente, e abrindo caminho para o desenvolvimento de novas soluções. Nós então propomos uma arquitetura de segurança que utiliza as estratégias apresentadas, e tecnologias como SDN, NFV e SR-IOV, para implementar domínios de rede seguros. As análises teórica e experimental da arquitetura proposta mostram considerável redução das superfícies de ataque em redes virtualizadas, com um pequeno impacto sobre o desempenho da comunicação entre máquinas virtuais de inquilinos da nuvem.
Paraskelidis, Athanasios. "Wireless network segregation utilising modulo in industrial environments." Thesis, University of Portsmouth, 2010. https://researchportal.port.ac.uk/portal/en/theses/wireless-network-segregation-utilising-modulo-in-industrial-environments(ae94690a-560e-4f7b-93d8-130b4873de96).html.
Повний текст джерелаOlsson, Eric J. "Literature survey on network concepts and measures to support research in network-centric operations." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FOlsson.pdf.
Повний текст джерелаZhou, You M. Eng Massachusetts Institute of Technology. "Computing network coordinates in the presence of Byzantine faults." Thesis, Massachusetts Institute of Technology, 2008. http://hdl.handle.net/1721.1/46365.
Повний текст джерелаThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Includes bibliographical references (p. 57-60).
Network coordinate systems allow for efficient construction of large-scale distributed systems on the Internet. Coordinates provide locality information in a compact way, without requiring each node to contact every potential neighbor; distances between two nodes' coordinates represent estimates of the network latency between them. Past work on network coordinates has assumed that all nodes in the system behave correctly. The techniques in these systems do not behave well when nodes are Byzantine. These Byzantine failures, wherein a faulty node can behave arbitrarily, can make the coordinate-based distance estimates meaningless. For example, a Byzantine node can delay responding to some other node, thus distorting that node's computation of its own location. We present a network coordinate system based on landmarks, reference nodes that are used for measurements, some of which may be Byzantine faulty. It scales linearly in the number of clients computing their coordinates and does not require excessive network traffic to allow clients to do so. Our results show that our system is able to compute accurate coordinates even when some landmarks are exhibiting Byzantine faults.
by You Zhou.
M.Eng.
Crellin, Kenneth Thomas. "Network time : synchronisation in real time distributed computing systems." Master's thesis, University of Cape Town, 1998. http://hdl.handle.net/11427/17933.
Повний текст джерелаMousa, Alzawi Mohamed. "Autonomic computing : using adaptive neural network in self-healing systems." Thesis, Liverpool John Moores University, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.571894.
Повний текст джерелаTasiopoulos, A. "On the deployment of low latency network applications over third-party in-network computing resources." Thesis, University College London (University of London), 2018. http://discovery.ucl.ac.uk/10049954/.
Повний текст джерелаJu, Weiyu. "Mobile Deep Neural Network Inference in Edge Computing with Resource Restrictions." Thesis, The University of Sydney, 2021. https://hdl.handle.net/2123/25038.
Повний текст джерелаNowshin, Fabiha. "Spiking Neural Network with Memristive Based Computing-In-Memory Circuits and Architecture." Thesis, Virginia Tech, 2021. http://hdl.handle.net/10919/103854.
Повний текст джерелаM.S.
In recent years neuromorphic computing systems have achieved a lot of success due to its ability to process data much faster and using much less power compared to traditional Von Neumann computing architectures. Artificial Neural Networks (ANNs) are models that mimic biological neurons where artificial neurons or neurodes are connected together via synapses, similar to the nervous system in the human body. here are two main types of Artificial Neural Networks (ANNs), Feedforward Neural Network (FNN) and Recurrent Neural Network (RNN). In this thesis we first study the types of RNNs and then move on to Spiking Neural Networks (SNNs). SNNs are an improved version of ANNs that mimic biological neurons closely through the emission of spikes. This shows significant advantages in terms of power and energy when carrying out data intensive applications by allowing spatio-temporal information processing capability. On the other hand, emerging non-volatile memory (eNVM) technology is key to emulate neurons and synapses for in-memory computations for neuromorphic hardware. A particular eNVM technology, memristors, have received wide attention due to their scalability, compatibility with CMOS technology and low power consumption properties. In this work we develop a spiking neural network by incorporating an inter-spike interval encoding scheme to convert the incoming input signal to spikes and use a memristive crossbar to carry out in-memory computing operations. We demonstrate the accuracy of our design through a small-scale hardware simulation for digit recognition and demonstrate an accuracy of 87% in software through MNIST simulations.
Shafaatdoost, Mani. "Approaches to Provisioning Network Topology of Virtual Machines in Cloud Systems." FIU Digital Commons, 2012. http://digitalcommons.fiu.edu/etd/784.
Повний текст джерелаКниги з теми "In-network computing"
Sharma, Deepak Kumar, Koyel Datta Gupta, and Rinky Dwivedi. Green Computing in Network Security. New York: CRC Press, 2021. http://dx.doi.org/10.1201/9781003097198.
Повний текст джерелаThampi, Sabu M., Erol Gelenbe, Mohammed Atiquzzaman, Vipin Chaudhary, and Kuan-Ching Li, eds. Advances in Computing and Network Communications. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6977-1.
Повний текст джерелаThampi, Sabu M., Erol Gelenbe, Mohammed Atiquzzaman, Vipin Chaudhary, and Kuan-Ching Li, eds. Advances in Computing and Network Communications. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6987-0.
Повний текст джерелаDas, Vinu V., and Janahanlal Stephen, eds. Advances in Communication, Network, and Computing. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35615-5.
Повний текст джерелаZhang, Yuchao, and Ke Xu. Network Management in Cloud and Edge Computing. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-0138-8.
Повний текст джерелаSchmeck, Hartmut, Theo Ungerer, and Lars Wolf, eds. Trends in Network and Pervasive Computing — ARCS 2002. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45997-9.
Повний текст джерелаAbawajy, Jemal H. Network and traffic engineering in emerging distributed computing applications. Hershey, PA: Information Science Reference, 2013.
Знайти повний текст джерелаKavian, Yousef S., and Mark Stephen Leeson. Resilient optical network design: Advances in fault-tolerant methodologies. Hershey, PA: Information Science Reference, 2012.
Знайти повний текст джерела1941-, Bradley Stephen P., and Nolan Richard L, eds. Sense & respond: Capturing value in the network era. Boston, Mass: Harvard Business School Press, 1998.
Знайти повний текст джерелаBaeza-Yates, Ricardo, Ugo Montanari, and Nicola Santoro, eds. Foundations of Information Technology in the Era of Network and Mobile Computing. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-0-387-35608-2.
Повний текст джерелаЧастини книг з теми "In-network computing"
Parker, J. D. "Synchronization in Network Protocols." In Workshops in Computing, 344–67. London: Springer London, 1990. http://dx.doi.org/10.1007/978-1-4471-3534-0_17.
Повний текст джерелаArsiwalla, Xerxes D., and Paul Verschure. "Computing Information Integration in Brain Networks." In Advances in Network Science, 136–46. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-28361-6_11.
Повний текст джерелаGray, Paul, Alan Krantz, Soeren Olesen, and Vaidy Sunderam. "Advances in heterogeneous network computing." In Recent Advances in Parallel Virtual Machine and Message Passing Interface, 83–92. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0056562.
Повний текст джерелаDwivedi, Rinky, and Koyel Datta Gupta. "Green Computing at a Glance." In Green Computing in Network Security, 1–8. New York: CRC Press, 2021. http://dx.doi.org/10.1201/9781003097198-1.
Повний текст джерелаMonien, B., and H. Sudborough. "Embedding one Interconnection Network in Another." In Computing Supplementum, 257–82. Vienna: Springer Vienna, 1990. http://dx.doi.org/10.1007/978-3-7091-9076-0_13.
Повний текст джерелаMayes, K. R., J. Bridgland, S. Quick, and A. Nisbet. "Network performance in arena." In High-Performance Computing and Networking, 1007–8. Berlin, Heidelberg: Springer Berlin Heidelberg, 1996. http://dx.doi.org/10.1007/3-540-61142-8_684.
Повний текст джерелаNanda Kishore, M. S., S. K. V. Jayakumar, G. Satya Reddy, P. Dhavachelvan, D. Chandramohan, and N. P. Soumya Reddy. "Web Service Suitability Assessment for Cloud Computing." In Trends in Network and Communications, 622–32. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22543-7_64.
Повний текст джерелаDongarra, Jack, Piotr Luszczek, Felix Wolf, Jesper Larsson Träff, Patrice Quinton, Hermann Hellwagner, Martin Fränzle, et al. "Systems Biology, Network Inference in." In Encyclopedia of Parallel Computing, 1997–2002. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-0-387-09766-4_466.
Повний текст джерелаChen, Yu, Kun Liu, and Ziqian Zhang. "Research on Network Optimization and Network Security in Power Wireless Private Network." In Advances in Intelligent Systems and Computing, 1335–44. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-8462-6_153.
Повний текст джерелаQi, Jiaju, and Long Zhao. "Data Center Network in Cloud Computing." In Encyclopedia of Wireless Networks, 260–63. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-78262-1_322.
Повний текст джерелаТези доповідей конференцій з теми "In-network computing"
Cinelis, Gintaris, and Kestutis Scevinskas. "Education of Professional Computing Competence in University." In eCAADe 2004: Architecture in the Network Society. eCAADe, 2004. http://dx.doi.org/10.52842/conf.ecaade.2004.459.
Повний текст джерелаCinelis, Gintaris, and Kestutis Scevinskas. "Education of Professional Computing Competence in University." In eCAADe 2004: Architecture in the Network Society. eCAADe, 2004. http://dx.doi.org/10.52842/conf.ecaade.2004.459.
Повний текст джерелаSu´rez, Juan-Luis, Fernando Sancho Caparrini, and Javier de la Rosa Perez. "The Art-Space of a Global Community: The Network of Baroque Paintings in Hispanic-America." In 2011 Second International Conference on Culture and Computing (Culture Computing). IEEE, 2011. http://dx.doi.org/10.1109/culture-computing.2011.17.
Повний текст джерелаNikolaou, Stefanos, Christos Anagnostopoulos, and Dimitrios Pezaros. "In-network Predictive Analytics in Edge Computing." In 2019 Wireless Days (WD). IEEE, 2019. http://dx.doi.org/10.1109/wd.2019.8734267.
Повний текст джерелаGelernter, Ben. "Help design challenges in network computing." In the 16th annual international conference. New York, New York, USA: ACM Press, 1998. http://dx.doi.org/10.1145/296336.296376.
Повний текст джерелаJasti, Amarnath, Surya Mohapatra, Bhargav Potluri, and Ravi Pendse. "Cloud computing in Aircraft Data Network." In 2011 Integrated Communication, Navigation, Surveillance Conference (ICNS). IEEE, 2011. http://dx.doi.org/10.1109/icnsurv.2011.5935273.
Повний текст джерелаSun, Xiaoping, Xiangfeng Luo, Jin Liu, Xiaorui Jiang, and Junsheng Zhang. "Semantics in Deep Neural-Network Computing." In 2015 11th International Conference on Semantics, Knowledge and Grids (SKG). IEEE, 2015. http://dx.doi.org/10.1109/skg.2015.42.
Повний текст джерелаAbdullah Antor, Md, Tasmin Jannat Tahsin, Minhas Abedin Sohan, and Syed Ahsanul Kabir. "High Performance Computing in Decentralized Network." In 2022 4th International Conference on Sustainable Technologies for Industry 4.0 (STI). IEEE, 2022. http://dx.doi.org/10.1109/sti56238.2022.10103309.
Повний текст джерелаBadgett, Mel, and Eric W. Cigan. "Simulation in a Network Computing Environment." In 1989 American Control Conference. IEEE, 1989. http://dx.doi.org/10.23919/acc.1989.4790222.
Повний текст джерелаDuarte, Elias P. "Leveraging In-Network Computing with Network Function Virtualization: Keynote." In 2020 IEEE/ACS 17th International Conference on Computer Systems and Applications (AICCSA). IEEE, 2020. http://dx.doi.org/10.1109/aiccsa50499.2020.9316464.
Повний текст джерелаЗвіти організацій з теми "In-network computing"
Sunderam, V. Enhancing functionality and performance in the PVM network computing system. Office of Scientific and Technical Information (OSTI), September 1996. http://dx.doi.org/10.2172/285228.
Повний текст джерелаSunderam, Vaidy. Enhancing Functionality and Performance in the PVM Network Computing System. Final project report. Office of Scientific and Technical Information (OSTI), December 1998. http://dx.doi.org/10.2172/760872.
Повний текст джерелаSunderam, V. Enhancing functionality and performance in the PVM network computing system. Period 1 progress report. Office of Scientific and Technical Information (OSTI), August 1995. http://dx.doi.org/10.2172/93753.
Повний текст джерелаRenard, Kenneth D., James R. Feight, Michael Amabile, and James Adametz. High-Bandwidth Tactical-Network Data Analysis in a High-Performance-Computing (HPC) Environment: Introduction. Fort Belvoir, VA: Defense Technical Information Center, September 2015. http://dx.doi.org/10.21236/ada622738.
Повний текст джерелаRenard, Kenneth D., Joseph D. Rivera, James R. Adametz, and Jordan R. Franssen. High-Bandwidth Tactical-Network Data Analysis in a High-Performance-Computing (HPC) Environment: Data Marshalling. Fort Belvoir, VA: Defense Technical Information Center, September 2015. http://dx.doi.org/10.21236/ada621309.
Повний текст джерелаPanneton, Brian, Brendan Tauras, Christopher Wancowicz, and Sean Coyne. High-Bandwidth Tactical-Network Data Analysis in a High-Performance-Computing (HPC) Environment: Device Status Data. Fort Belvoir, VA: Defense Technical Information Center, August 2015. http://dx.doi.org/10.21236/ada626790.
Повний текст джерелаPanneton, Brian, and James Adametz. High-Bandwidth Tactical-Network Data Analysis in a High-Performance-Computing (HPC) Environment: HPC Data Reduction Framework. Fort Belvoir, VA: Defense Technical Information Center, August 2015. http://dx.doi.org/10.21236/ada626053.
Повний текст джерелаBeyeler, Walter Eugene, Thomas Frank, Jr Corbet, and Jacob A. Hobbs. A demand-driven, capacity-constrained, adaptive algorithm for computing steady-state and transient flows in a petroleum transportation network. Office of Scientific and Technical Information (OSTI), November 2012. http://dx.doi.org/10.2172/1055878.
Повний текст джерелаValdez, Luis, Miltos Alamaniotis, and Alexander Heifetz. Anomaly Detection in Gamma Spectra Using Hopfield Neural Network with B-SAT and Grover’s Algorithm on a Quantum Computing Simulator. Office of Scientific and Technical Information (OSTI), September 2022. http://dx.doi.org/10.2172/1894587.
Повний текст джерелаMarkova, Oksana, Serhiy Semerikov та Maiia Popel. СoCalc as a Learning Tool for Neural Network Simulation in the Special Course “Foundations of Mathematic Informatics”. Sun SITE Central Europe, травень 2018. http://dx.doi.org/10.31812/0564/2250.
Повний текст джерела