B Addis, A Capone, G Carello, LG Gianoli… - Computer …, 2016 - Elsevier
The widespread proliferation of Internet and wireless applications has produced a significant increase of ICT energy footprint. As a response, in the last years, significant efforts have …
F Mehdipour, H Noori, B Javadi - Advances in Computers, 2016 - Elsevier
The volume of generated data increases by the rapid growth of Internet of Things, leading to the big data proliferation and more opportunities for datacenters. Highly virtualized cloud …
R Khan, SU Khan - Procedia Computer Science, 2016 - Elsevier
Several studies in the past have revealed that network end user devices are left powered up 24/7 even when idle just for the sake of maintaining Internet connectivity. Network devices …
R Bolla, R Khan, M Repetto - IEEE Journal on Selected Areas …, 2016 - ieeexplore.ieee.org
The idea of proxying network connectivity has been proposed as an efficient mechanism to maintain network presence on behalf of idle devices, so that they can" sleep". The concept …
GJ Boss, G Cohen, JR Kozloski, CA Pickover… - US Patent …, 2016 - Google Patents
Disclosed is a novel system and method for maintaining computing functionality when a client device must be used in a low-power state. More particularly, when a client device is …
C Dastagiraiah, VK Reddy… - International Journal of …, 2016 - researchgate.net
Thinking Processing is another example developing in IT environment with expansive determinations of base furthermore, sources. Fill Controlling is a vital part of distributed …
S Park, C Park - IEICE TRANSACTIONS on Information and …, 2016 - search.ieice.org
Data deduplication is a technology that eliminates redundant data to save storage space. Most previous studies on data deduplication target backup storage, where the deduplication …
The energy consumption by ICT (Information and Communication Technology) equipment is rapidly increasing which causes a significant economic and environmental problem. At …
H Zhang, X Zhang, H Hu, C Li, Y Lin, R Ma - 2016 - core.ac.uk
abstract The security incidents ion networks are sudden and uncertain, it is very hard to precisely predict the network security situation by traditional methods. In order to improve the …