结果过滤

发表日期
成果类型
当前显示 6-10 of 84
 | 
[摘要] 

In order to ensure the data security, high availability of services and good access performance, more and more large-scale distributed systems are deployed across IDCs. When different parts of dist...

[摘要] 

Today online video is growing and becoming increasingly popular on the Web. It is no secret that illegal content is now a one-click-away from everyone, including children and minors. Intelligent vi...

[摘要] 

C10M is an Internet scalability problem

regarding how to handle 10 million simultaneous TCP

connections on a web server. Although kernel- and user-

level approaches have been prop...

[摘要] 

The Deep Packet Inspection (DPI) system examines each captured network packet to find malicious events. The quality of network traffic set an upper limit of DPI system’s functionality, such a...

[摘要] 

In recent years, the explosive growth of high-frequency data access requirements had fueled the proliferation of in-memory key-value stores. Redis is a widely used in-memory key-value store, which ...

当前显示 6-10 of 84