Proxcache: A new cache deployment strategy in information-centric network for mitigating path and content redundancy
One of the promising paradigms for resource sharing with maintaining the basic Internet semantics is the Information-Centric Networking (ICN). ICN distinction with the current Internet is its ability to refer contents by names with partly dissociating the host-to-host practice of Internet Protocol a...
| Auteur principal: | Ibrahim, Abdullahi |
|---|---|
| Format: | Thèse |
| Langue: | anglais anglais |
| Publié: |
2016
|
| Sujets: | |
| Accès en ligne: | https://etd.uum.edu.my/6010/1/s95908_01.pdf https://etd.uum.edu.my/6010/2/s95908_02.pdf |
Documents similaires
Flexpop: A popularity-based caching strategy for multimedia applications in information-centric networking
par: Ud Din, Ikram
Publié: (2016)
par: Ud Din, Ikram
Publié: (2016)
Compound popular content caching strategy to enhance the cache management performance in named data networking
par: Naeem, Muhammad Ali
Publié: (2020)
par: Naeem, Muhammad Ali
Publié: (2020)
Implications of caching for JXTA peers
par: Rozlina, Mohamed
Publié: (2014)
par: Rozlina, Mohamed
Publié: (2014)
The redundancy-based disaster recovery framework for cloud computing
par: Sabbaghi, Fatemeh
Publié: (2013)
par: Sabbaghi, Fatemeh
Publié: (2013)
Operating system kernel malware characterization using data-centric approach
par: Mohamad Har, Harmi Armira
Publié: (2018)
par: Mohamad Har, Harmi Armira
Publié: (2018)
Cache replacement algorithm using hierarchical allocation scheduling
par: Mohd Sharif, Mohammad Faizal
Publié: (2014)
par: Mohd Sharif, Mohammad Faizal
Publié: (2014)
Intelligent web proxy caching based on supervised machine learning
par: Ali Ahmed, Waleed
Publié: (2012)
par: Ali Ahmed, Waleed
Publié: (2012)
Performance evaluation of caching techniques for video on demand workload in named data network
par: Taher, Sadaq Jebur
Publié: (2016)
par: Taher, Sadaq Jebur
Publié: (2016)
Development Of Energy-Balanced Node
Deployment Strategies To Reduce Energy
Hole Problem In Wireless Sensor
Networks
par: Asharioun, Hadi
Publié: (2015)
par: Asharioun, Hadi
Publié: (2015)
Hybridflood algorithms minimizing redundant messages and maximizing efficiency of search in unstructured P2P networks
par: Barjini, Hassan
Publié: (2012)
par: Barjini, Hassan
Publié: (2012)
Minimization of Test Cases and Fault Detection Effectiveness Improvement through Modified Reduction with Selective Redundancy Algorithm
par: Nikfal, Shima
Publié: (2007)
par: Nikfal, Shima
Publié: (2007)
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
par: Jamal, Fara
Publié: (2021)
par: Jamal, Fara
Publié: (2021)
Software Model Checking For Distributed Applications Using Hybridization Of Centralization And Cache Approaches
par: Hing, Ratana
Publié: (2024)
par: Hing, Ratana
Publié: (2024)
Honeynet as a service deployment approach in enabling virtual crime scene investigation
par: Hasheminejad, Hamidreza
Publié: (2015)
par: Hasheminejad, Hamidreza
Publié: (2015)
Modeling and querying alternative paths in Kuantan
par: Mohamad Salleh, Mazlina
Publié: (2007)
par: Mohamad Salleh, Mazlina
Publié: (2007)
Video copy-move forgery detection scheme based on displacement paths
par: Ibrahim, Omar Ismael
Publié: (2017)
par: Ibrahim, Omar Ismael
Publié: (2017)
Optimal path planning algorithms in virtual environments
par: Hassan, Rohayanti
Publié: (2006)
par: Hassan, Rohayanti
Publié: (2006)
An Automatic Driver Deployment Mechanism In The Osgi Gateway For Smart Homes
par: Lau, Sian Lerk
Publié: (2008)
par: Lau, Sian Lerk
Publié: (2008)
Energy efficient chain based routing protocol for deterministic node deployment in wireless sensor networks
par: Marhoon, Haydar Abdulameer
Publié: (2017)
par: Marhoon, Haydar Abdulameer
Publié: (2017)
Learning path tracking system
par: Khalid, Khalina
Publié: (2006)
par: Khalid, Khalina
Publié: (2006)
Behavioural Academic Self Esteem Deployment and Analysis Using Fuzzy Expert System
par: Afzanizam, Alias
Publié: (2008)
par: Afzanizam, Alias
Publié: (2008)
Shortest Path Trajectory System Based on Dijkstra Algorithm
par: Putri, Indah Pratiwi
Publié: (2012)
par: Putri, Indah Pratiwi
Publié: (2012)
Multi-level mobile cache consistency schemes based on application requirements
par: Mahmoud Yagoub, Doha Elsharief
Publié: (2012)
par: Mahmoud Yagoub, Doha Elsharief
Publié: (2012)
Finding minimum path by using Genetic Algorithm (GA)/ Siti Zuraifah Hashim
par: Hashim, Siti Zuraifah
Publié: (2007)
par: Hashim, Siti Zuraifah
Publié: (2007)
Contact tracing strategy to isolate infectious bots in mitigating iot botnet propagation and preserve object of forensic interest
par: Ibrahim, Mohammed
Publié: (2021)
par: Ibrahim, Mohammed
Publié: (2021)
Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decision-making
par: Daba, Layth Muwafaq Abdulhussein
Publié: (2023)
par: Daba, Layth Muwafaq Abdulhussein
Publié: (2023)
Framework of human behavior to mitigate the insider threat
par: Badawi, Jihad Wajeeh
Publié: (2013)
par: Badawi, Jihad Wajeeh
Publié: (2013)
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
par: Enshaei, Mehdi
Publié: (2015)
par: Enshaei, Mehdi
Publié: (2015)
A preliminary study of course information on i-Learn perspectives : focusing in accessibility, contents and user interface parameter / Noor Saadah Sulaiman
par: Sulaiman, Noor Saadah
Publié: (2007)
par: Sulaiman, Noor Saadah
Publié: (2007)
Solving shortest path problem using gravitational search algorithm and neural networks
par: Sinaie, Saman
Publié: (2010)
par: Sinaie, Saman
Publié: (2010)
Streamlining Motorola GSG Malaysia's change management systems under the organization innovation and deployment optimization initiative
par: Ang, Suk Ding
Publié: (2004)
par: Ang, Suk Ding
Publié: (2004)
Multi-shape symmetric encryption mechanism for nongeneric attacks mitigation
par: Abdelgader, Abdelrahman Abdelgader Altigani
Publié: (2022)
par: Abdelgader, Abdelrahman Abdelgader Altigani
Publié: (2022)
A new human-centric model of airport smart security system to enhance the passenger experience
par: Almarri, Ghalib Abdulla
Publié: (2021)
par: Almarri, Ghalib Abdulla
Publié: (2021)
Z-path trajectory mechanism for mobile beacon-assisted localization in wireless sensor networks
par: Rezazadeh, Javad
Publié: (2014)
par: Rezazadeh, Javad
Publié: (2014)
A Continuous Overlay Path Probing Algorithm For Overlay Networks
par: Feily, Maryam
Publié: (2013)
par: Feily, Maryam
Publié: (2013)
Traffic Balancing Method in Shortest Path Routing
par: Mohamed Abdulqader, Makarem
Publié: (2007)
par: Mohamed Abdulqader, Makarem
Publié: (2007)
New face recognition descriptor based on edge information for surgically-altered faces in uncontrolled environment
par: Chude-Olisah, Chollette Chiazor
Publié: (2015)
par: Chude-Olisah, Chollette Chiazor
Publié: (2015)
Enhancement of serins to mitigate passive wormhole attack in wireless sensor networks
par: Modirkhazeni, Ali
Publié: (2011)
par: Modirkhazeni, Ali
Publié: (2011)
Data caching framework and strategies for integrity constraint checking in mobile database system
par: Dzolkhifli, Zarina
Publié: (2012)
par: Dzolkhifli, Zarina
Publié: (2012)
Modelling and reasoning of large scale fuzzy petri net using inference path and bidirectional methods
par: Zhou, Kaiqing
Publié: (2015)
par: Zhou, Kaiqing
Publié: (2015)
Documents similaires
-
Flexpop: A popularity-based caching strategy for multimedia applications in information-centric networking
par: Ud Din, Ikram
Publié: (2016) -
Compound popular content caching strategy to enhance the cache management performance in named data networking
par: Naeem, Muhammad Ali
Publié: (2020) -
Implications of caching for JXTA peers
par: Rozlina, Mohamed
Publié: (2014) -
The redundancy-based disaster recovery framework for cloud computing
par: Sabbaghi, Fatemeh
Publié: (2013) -
Operating system kernel malware characterization using data-centric approach
par: Mohamad Har, Harmi Armira
Publié: (2018)