DIKUL - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UL. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 189
11.
  • A Framework for eBPF-Based ... A Framework for eBPF-Based Network Functions in an Era of Microservices
    Miano, Sebastiano; Risso, Fulvio; Bernal, Mauricio Vasquez ... IEEE eTransactions on network and service management, 2021-March, 2021-3-00, 20210301, Letnik: 18, Številka: 1
    Journal Article
    Recenzirano

    By moving network functionality from dedicated hardware to software running on end-hosts, Network Functions Virtualization (NFV) pledges the benefits of cloud computing to packet processing. While ...
Celotno besedilo
Dostopno za: UL
12.
  • Machine learning-powered tr... Machine learning-powered traffic processing in commodity hardware with eBPF
    Gallego-Madrid, Jorge; Bru-Santa, Irene; Ruiz-Rodenas, Alvaro ... Computer networks (Amsterdam, Netherlands : 1999), April 2024, 2024-04-00, Letnik: 243
    Journal Article
    Recenzirano
    Odprti dostop

    Network softwarization is paving the way for the design and development of Next-Generation Networks (NGNs), which are demanding profound improvements to existing communication infrastructures. Two of ...
Celotno besedilo
Dostopno za: UL
13.
  • Accelerating network analyt... Accelerating network analytics with an on-NIC streaming engine
    Miano, Sebastiano; Lettieri, Giuseppe; Antichi, Gianni ... Computer networks (Amsterdam, Netherlands : 1999), March 2024, 2024-03-00, Letnik: 241
    Journal Article
    Recenzirano

    Data Stream Processing engines have recently emerged as powerful tools for simplifying the analysis of network telemetry data. Motivated by the ever-growing volume of data requiring analysis, ...
Celotno besedilo
Dostopno za: UL
14.
Celotno besedilo
Dostopno za: UL
15.
  • EZIOTracer EZIOTracer
    Islam Naas, Mohammed; Trahay, François; Colin, Alexis ... Operating systems review, 07/2021, Letnik: 55, Številka: 1
    Journal Article
    Odprti dostop

    Tracing is a popular method for evaluating, investigating, and modeling the performance of today's storage systems. Tracing has become crucial with the increase in complexity of modern storage ...
Celotno besedilo
Dostopno za: UL

PDF
16.
  • eBPFlow: A Hardware/Softwar... eBPFlow: A Hardware/Software Platform to Seamlessly Offload Network Functions Leveraging eBPF
    Pacifico, Racyus D. G.; Duarte, Lucas F. S.; Vieira, Luiz F. M. ... IEEE/ACM transactions on networking, 2024-April, 2024-4-00, 20240401, Letnik: 32, Številka: 2
    Journal Article
    Recenzirano

    NFV and SDN enable flexibility and programmability at the data plane. In addition, offloading packet processing to a hardware saves processing resources to compute other workloads. However, ...
Celotno besedilo
Dostopno za: UL
17.
  • Improving live migration ef... Improving live migration efficiency in QEMU: An eBPF-based paravirtualized approach
    Storniolo, Filippo; Leonardi, Luigi; Lettieri, Giuseppe Journal of systems architecture, 20/May , Letnik: 150
    Journal Article
    Recenzirano
    Odprti dostop

    Virtual Machines are the key technology in cloud computing. In order to upgrade, repair or service the physical machine where a Virtual Machine is hosted, a common practice is to live-migrate the ...
Celotno besedilo
Dostopno za: UL
18.
  • MiddleCache: Accelerating TCP based In-memory Key-value Stores using eBPF
    Pang, Yiren; Chen, Sheng; Li, Wenxin ... 2023 IEEE 29th International Conference on Parallel and Distributed Systems (ICPADS), 2023-Dec.-17
    Conference Proceeding

    In-memory key-value stores are widely used in modern web services to support large-scale user requests by caching popular data. Their performance is critical, and BMC, the state-of-the-art work, ...
Celotno besedilo
Dostopno za: UL
19.
  • DNSxP: Enhancing data exfil... DNSxP: Enhancing data exfiltration protection through data plane programmability
    Steadman, Jacob; Scott-Hayward, Sandra Computer networks (Amsterdam, Netherlands : 1999), 08/2021, Letnik: 195
    Journal Article
    Recenzirano
    Odprti dostop

    According to a 2019 Radware report, guarding sensitive data is the highest priority area for investment in cyber security. This is no surprise given the high number of reported data breach incidents ...
Celotno besedilo
Dostopno za: UL
20.
  • Kernel-level tracing for de... Kernel-level tracing for detecting stegomalware and covert channels in Linux environments
    Caviglione, Luca; Mazurczyk, Wojciech; Repetto, Matteo ... Computer networks (Amsterdam, Netherlands : 1999), 05/2021, Letnik: 191
    Journal Article
    Recenzirano
    Odprti dostop

    Modern malware is becoming hard to spot since attackers are increasingly adopting new techniques to elude signature- and rule-based detection mechanisms. Among the others, steganography and ...
Celotno besedilo
Dostopno za: UL

PDF
1 2 3 4 5
zadetkov: 189

Nalaganje filtrov