2019 IEEE International Conference on Advanced Trends in Information Theory (ATIT) 2019
DOI: 10.1109/atit49449.2019.9030483
|View full text |Cite
|
Sign up to set email alerts
|

The Formulation and Solution of the Task of the Optimum Reservation in the System of Residual Classes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…If the Boolean value is zero, it indicates that the packet should not be forwarded from the corresponding port, otherwise, it indicates that the flow should be forwarded along with the port as shown in Table 2. Generally, NDN data flows are thus able to de-map the same RPI from the above calculation process, a more detailed description of the CRT algorithm can be found in [15], and also some papers focused on optimal RNS can be found in [20], [21], and [22].…”
Section: Querying Group Membershipmentioning
confidence: 99%
See 1 more Smart Citation
“…If the Boolean value is zero, it indicates that the packet should not be forwarded from the corresponding port, otherwise, it indicates that the flow should be forwarded along with the port as shown in Table 2. Generally, NDN data flows are thus able to de-map the same RPI from the above calculation process, a more detailed description of the CRT algorithm can be found in [15], and also some papers focused on optimal RNS can be found in [20], [21], and [22].…”
Section: Querying Group Membershipmentioning
confidence: 99%
“…In the proposed method, we simulate and compare the required memory space for different output port densities and the number of input entries. which includes ρ = 16, 32, 64, and 128, and the number of entries ranging from 2 8 -2 20 , and BF with different false positive rates (P=1E-03, 1E-05, 1E-08), and the corresponding optimal number of hash functions are used for comparison. As shown in Figure 4, it can be seen that the memory required grows linearly with the number of entries, and it can be seen that the memory required by RNS is always much smaller than that of BF in all port-densities.…”
Section: Space Efficiencymentioning
confidence: 99%
“…The existence of fault tolerant features of the CS can be achieved as a result of the application of two main methods namely the Active Fault Tolerance (AFT) and the Passive Fault Tolerant (PFT). Some studies done by (Yatskiv and Tsavolyk, 2017;Krasnobaev et al, 2019) indicate the use of PFT technique that helps in the improvement of reliability in CS that is widely used in positional number systems. There is however lack of studies conducted using residue classes in achieving fault tolerance and also improving the reliability of CS that is based on the application of AFT.…”
Section: Introductionmentioning
confidence: 99%