- In the area of network information security, it is necessary to study the security in the end-to-end communication. This paper proposes a theory of virtual network by end-to-end....
Guannan Gong, Liang Hu, Kuo Zhao, Jinxin He, Yuefe...
Our research addresses two important problems that arise in modern large-scale distributed systems: (1) the necessity to virtualize their data flows by applying actions such as ï...
Radhika Niranjan, Ada Gavrilovska, Karsten Schwan,...
The overhead of copying data through the central processor by a message passing protocol limits data transfer bandwidth. If the network interface directly transfers the user'...
Hiroshi Tezuka, Francis O'Carroll, Atsushi Hori, Y...
From an ecological but also from an economical and in the meantime a technical view the fast ongoing increase of power consumption in today’s data centers is no longer feasible....
This demonstration shows a novel virtualization architecture, called Multi-Purpose Access Point (MPAP), which can virtualize multiple heterogenous wireless standards based on soft...
Yong He, Ji Fang, Jiansong Zhang, Haichen Shen, Ku...