Essays about: "Available Bandwidth"
Showing result 1 - 5 of 148 essays containing the words Available Bandwidth.
-
1. An evaluation of GPU virtualization
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : There has been extensive research and progress on virtualization on CPUs for a while. More recently the focus on GPU virtualization has increased as processing power doubles roughly every 2.5 years. Coupled with advances in memory management and the PCIe standard the first hardware assisted virtual solutions became available in the 2010s. READ MORE
-
2. Digitally Controlled Oscillator Topologies for mm-Wave Pulsed Coherent Radar
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : The advancement of future generations of wireless communication and radar sensing warrants the need for mm-wave digitally controlled oscillators (DCOs) with high-frequency trade-offs in consideration. The purpose of this project is to investigate DCO topologies inspired from scientific literature. READ MORE
-
3. Towards More Efficient Wireless Power Transfer for 6G
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : As time is moving forward, the world is becoming more dependent on Internet of Things (IoT) devices. The vision for the future involves IoT devices participating in various aspects of our daily lives, including sensing, controlling, and communicating. READ MORE
-
4. Cloud-native storage solutions for Kubernetes : A performance comparison
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : Kubernetes is a container orchestration system that has been rising in popularity in recent years. The modular nature of Kubernetes allows the usage of different storage solutions, and for cloud environments, cloud-native distributed storage solutions maybe attractive due to their redundant nature. READ MORE
-
5. The Effect Background Traffic in VPNs has on Website Fingerprinting
University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)Abstract : Tor and VPNs are used by many to be anonymous and circumvent censorship on the Internet. Therefore, traffic analysis attacks that enable adversaries to link users to their online activities are a severe threat. READ MORE