Abstract: Solving AC-optimal power flow (AC-OPF) in real-time is crucial for further power system operation and security analysis. To this end, data-driven methods are employed to directly output the ...
Abstract: Software-Defined Networking (SDN) switches typically have limited ternary content addressable memory (TCAM) that caches the flow entries on the data plane. The scarcity and strong resource ...
Abstract: Data Flow Diagrams (DFD) have proven effective in designing and analyzing the flow of data in enterprise systems. They serve as indispensable tools for enterprises that are undergoing ...
WASHINGTON, Nov 18 (Reuters) - A divided U.S. Federal Reserve begins receiving updated economic reports from the now-reopened federal government this week as policymakers hope for clarity in their ...
Abstract: Non-control-data attacks are those attacks that purely target and modify the non-control data of a program, such as boolean values, user input or configuration parameters, and leave the ...
Abstract: Asynchronous circuits with low power and robustness are revived in emerging applications such as the Internet of Things (IoT) and neuromorphic chips, thanks to clock-less and event-driven ...
Abstract: Traffic shaping is a common function at end hosts. Compared with hardware ones, software shapers are more flexible to be developed and deployed, and thus are very attractive. Nevertheless, ...
A ransomware attack at Motility Software Solutions, a provider of dealer management software (DMS), has exposed the sensitive data of 766,000 customers. Motility (formerly known as Systems 2000/Sys2K) ...
A monthly overview of things you need to know as an architect or aspiring architect. Unlock the full InfoQ experience by logging in! Stay updated with your favorite authors and topics, engage with ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results