Proxcache: A new cache deployment strategy in information-centric network for mitigating path and content redundancy
One of the promising paradigms for resource sharing with maintaining the basic Internet semantics is the Information-Centric Networking (ICN). ICN distinction with the current Internet is its ability to refer contents by names with partly dissociating the host-to-host practice of Internet Protocol a...
| Main Author: | Ibrahim, Abdullahi |
|---|---|
| Format: | Thesis |
| Language: | English English |
| Published: |
2016
|
| Subjects: | |
| Online Access: | https://etd.uum.edu.my/6010/1/s95908_01.pdf https://etd.uum.edu.my/6010/2/s95908_02.pdf |
Similar Items
Flexpop: A popularity-based caching strategy for multimedia applications in information-centric networking
by: Ud Din, Ikram
Published: (2016)
by: Ud Din, Ikram
Published: (2016)
Compound popular content caching strategy to enhance the cache management performance in named data networking
by: Naeem, Muhammad Ali
Published: (2020)
by: Naeem, Muhammad Ali
Published: (2020)
Implications of caching for JXTA peers
by: Rozlina, Mohamed
Published: (2014)
by: Rozlina, Mohamed
Published: (2014)
The redundancy-based disaster recovery framework for cloud computing
by: Sabbaghi, Fatemeh
Published: (2013)
by: Sabbaghi, Fatemeh
Published: (2013)
Operating system kernel malware characterization using data-centric approach
by: Mohamad Har, Harmi Armira
Published: (2018)
by: Mohamad Har, Harmi Armira
Published: (2018)
Cache replacement algorithm using hierarchical allocation scheduling
by: Mohd Sharif, Mohammad Faizal
Published: (2014)
by: Mohd Sharif, Mohammad Faizal
Published: (2014)
Intelligent web proxy caching based on supervised machine learning
by: Ali Ahmed, Waleed
Published: (2012)
by: Ali Ahmed, Waleed
Published: (2012)
Performance evaluation of caching techniques for video on demand workload in named data network
by: Taher, Sadaq Jebur
Published: (2016)
by: Taher, Sadaq Jebur
Published: (2016)
Development Of Energy-Balanced Node
Deployment Strategies To Reduce Energy
Hole Problem In Wireless Sensor
Networks
by: Asharioun, Hadi
Published: (2015)
by: Asharioun, Hadi
Published: (2015)
Hybridflood algorithms minimizing redundant messages and maximizing efficiency of search in unstructured P2P networks
by: Barjini, Hassan
Published: (2012)
by: Barjini, Hassan
Published: (2012)
Minimization of Test Cases and Fault Detection Effectiveness Improvement through Modified Reduction with Selective Redundancy Algorithm
by: Nikfal, Shima
Published: (2007)
by: Nikfal, Shima
Published: (2007)
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
by: Jamal, Fara
Published: (2021)
by: Jamal, Fara
Published: (2021)
Software Model Checking For Distributed Applications Using Hybridization Of Centralization And Cache Approaches
by: Hing, Ratana
Published: (2024)
by: Hing, Ratana
Published: (2024)
Honeynet as a service deployment approach in enabling virtual crime scene investigation
by: Hasheminejad, Hamidreza
Published: (2015)
by: Hasheminejad, Hamidreza
Published: (2015)
Modeling and querying alternative paths in Kuantan
by: Mohamad Salleh, Mazlina
Published: (2007)
by: Mohamad Salleh, Mazlina
Published: (2007)
Video copy-move forgery detection scheme based on displacement paths
by: Ibrahim, Omar Ismael
Published: (2017)
by: Ibrahim, Omar Ismael
Published: (2017)
Optimal path planning algorithms in virtual environments
by: Hassan, Rohayanti
Published: (2006)
by: Hassan, Rohayanti
Published: (2006)
An Automatic Driver Deployment Mechanism In The Osgi Gateway For Smart Homes
by: Lau, Sian Lerk
Published: (2008)
by: Lau, Sian Lerk
Published: (2008)
Energy efficient chain based routing protocol for deterministic node deployment in wireless sensor networks
by: Marhoon, Haydar Abdulameer
Published: (2017)
by: Marhoon, Haydar Abdulameer
Published: (2017)
Learning path tracking system
by: Khalid, Khalina
Published: (2006)
by: Khalid, Khalina
Published: (2006)
Behavioural Academic Self Esteem Deployment and Analysis Using Fuzzy Expert System
by: Afzanizam, Alias
Published: (2008)
by: Afzanizam, Alias
Published: (2008)
Shortest Path Trajectory System Based on Dijkstra Algorithm
by: Putri, Indah Pratiwi
Published: (2012)
by: Putri, Indah Pratiwi
Published: (2012)
Multi-level mobile cache consistency schemes based on application requirements
by: Mahmoud Yagoub, Doha Elsharief
Published: (2012)
by: Mahmoud Yagoub, Doha Elsharief
Published: (2012)
Finding minimum path by using Genetic Algorithm (GA)/ Siti Zuraifah Hashim
by: Hashim, Siti Zuraifah
Published: (2007)
by: Hashim, Siti Zuraifah
Published: (2007)
Contact tracing strategy to isolate infectious bots in mitigating iot botnet propagation and preserve object of forensic interest
by: Ibrahim, Mohammed
Published: (2021)
by: Ibrahim, Mohammed
Published: (2021)
Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decision-making
by: Daba, Layth Muwafaq Abdulhussein
Published: (2023)
by: Daba, Layth Muwafaq Abdulhussein
Published: (2023)
Framework of human behavior to mitigate the insider threat
by: Badawi, Jihad Wajeeh
Published: (2013)
by: Badawi, Jihad Wajeeh
Published: (2013)
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
by: Enshaei, Mehdi
Published: (2015)
by: Enshaei, Mehdi
Published: (2015)
A preliminary study of course information on i-Learn perspectives : focusing in accessibility, contents and user interface parameter / Noor Saadah Sulaiman
by: Sulaiman, Noor Saadah
Published: (2007)
by: Sulaiman, Noor Saadah
Published: (2007)
Solving shortest path problem using gravitational search algorithm and neural networks
by: Sinaie, Saman
Published: (2010)
by: Sinaie, Saman
Published: (2010)
Streamlining Motorola GSG Malaysia's change management systems under the organization innovation and deployment optimization initiative
by: Ang, Suk Ding
Published: (2004)
by: Ang, Suk Ding
Published: (2004)
Multi-shape symmetric encryption mechanism for nongeneric attacks mitigation
by: Abdelgader, Abdelrahman Abdelgader Altigani
Published: (2022)
by: Abdelgader, Abdelrahman Abdelgader Altigani
Published: (2022)
A new human-centric model of airport smart security system to enhance the passenger experience
by: Almarri, Ghalib Abdulla
Published: (2021)
by: Almarri, Ghalib Abdulla
Published: (2021)
Z-path trajectory mechanism for mobile beacon-assisted localization in wireless sensor networks
by: Rezazadeh, Javad
Published: (2014)
by: Rezazadeh, Javad
Published: (2014)
A Continuous Overlay Path Probing Algorithm For Overlay Networks
by: Feily, Maryam
Published: (2013)
by: Feily, Maryam
Published: (2013)
Traffic Balancing Method in Shortest Path Routing
by: Mohamed Abdulqader, Makarem
Published: (2007)
by: Mohamed Abdulqader, Makarem
Published: (2007)
New face recognition descriptor based on edge information for surgically-altered faces in uncontrolled environment
by: Chude-Olisah, Chollette Chiazor
Published: (2015)
by: Chude-Olisah, Chollette Chiazor
Published: (2015)
Enhancement of serins to mitigate passive wormhole attack in wireless sensor networks
by: Modirkhazeni, Ali
Published: (2011)
by: Modirkhazeni, Ali
Published: (2011)
Data caching framework and strategies for integrity constraint checking in mobile database system
by: Dzolkhifli, Zarina
Published: (2012)
by: Dzolkhifli, Zarina
Published: (2012)
Modelling and reasoning of large scale fuzzy petri net using inference path and bidirectional methods
by: Zhou, Kaiqing
Published: (2015)
by: Zhou, Kaiqing
Published: (2015)
Similar Items
-
Flexpop: A popularity-based caching strategy for multimedia applications in information-centric networking
by: Ud Din, Ikram
Published: (2016) -
Compound popular content caching strategy to enhance the cache management performance in named data networking
by: Naeem, Muhammad Ali
Published: (2020) -
Implications of caching for JXTA peers
by: Rozlina, Mohamed
Published: (2014) -
The redundancy-based disaster recovery framework for cloud computing
by: Sabbaghi, Fatemeh
Published: (2013) -
Operating system kernel malware characterization using data-centric approach
by: Mohamad Har, Harmi Armira
Published: (2018)