2012
DOI: 10.1007/978-3-642-29843-1_73
|View full text |Cite
|
Sign up to set email alerts
|

Large-Scale Simulation of Uniform Load Traffic for Modeling of Throughput on a Crossbar Switch Node

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 7 publications
0
6
0
Order By: Relevance
“…100 000.n, 10 6 .n . Fig.10 shows the results from computer simulation of the PIM-algorithm with input data S-Pattern 10, S-Pattern 100 , S-Pattern 1000 taken from [12] and the new PI-Pattern k . Sizes of the crossbar matrix used for these simulations range from 2x2 to 130x130.…”
Section: Computer Simulationmentioning
confidence: 99%
See 3 more Smart Citations
“…100 000.n, 10 6 .n . Fig.10 shows the results from computer simulation of the PIM-algorithm with input data S-Pattern 10, S-Pattern 100 , S-Pattern 1000 taken from [12] and the new PI-Pattern k . Sizes of the crossbar matrix used for these simulations range from 2x2 to 130x130.…”
Section: Computer Simulationmentioning
confidence: 99%
“…The traffic matrices for S-Pattern 1 and traffic matrices for S-Pattern i are shown in Fig.2. The S-Pattern i imposes a limit on the buffer size of the input line to i.n requests [12]. In order to overcome this restriction, the S-Pattern i can be further developed as a periodic in time input sequence of requests as it is shown in fig.…”
Section: A Model Of Uniform Trafficmentioning
confidence: 99%
See 2 more Smart Citations
“…But if the True RNG exists on the server and a lot of users trying to use this shared RNG through their web applications at the same time, then the RNG entropy also go to collapse. 4 Then all RNG entropy will be compromised but it will stay hidden about the clients of shared hosting services, which will continue to work as if everything is normal. This will be a perfect moment for the any hacker attacks over cryptography protection.…”
Section: A R T I C L E I Nmentioning
confidence: 99%