Essays about: "distributed application"
Showing result 16 - 20 of 393 essays containing the words distributed application.
-
16. Consensus Algorithms in Blockchain : A survey to create decision trees for blockchain applications
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Blockchain is a decentralized database that is distributed among a computer network. To enable a smooth decision making process without any authority, different blockchain applications use their own consensus algorithms. The problem is that for a new blockchain application, there is limited aid in deciding which algorithm it should implement. READ MORE
-
17. Optimizing Consensus Protocols with Machine Learning Models : A cache-based approach
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Distributed systems offer a reliable and scalable solution for tackling massive and complex tasks that cannot be handled by a single computer. However, standard consensus protocols used in such systems often replicate data without considering the workload, leading to unnecessary retransmissions. READ MORE
-
18. Auto-Tuning Apache Spark Parameters for Processing Large Datasets
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Apache Spark is a popular open-source distributed processing framework that enables efficient processing of large amounts of data. Apache Spark has a large number of configuration parameters that are strongly related to performance. Selecting an optimal configuration for Apache Spark application deployed in a cloud environment is a complex task. READ MORE
-
19. Minimizing Blast Radius of Chaos Engineering Experiments via Steady-State Metrics Forecasting
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Chaos Engineering (CE) intentionally disrupts distributed systems by introducing faults into the system to better understand and improve their resilience. By studying these intentional disruptions, CE provides insights that help enhance system performance and the overall user experience. READ MORE
-
20. Securing SDN Data Plane:Investigating the effects of IP SpoofingAttacks on SDN Switches and its Mitigation : Simulation of IP spoofing using Mininet
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background:Software-Defined Networking (SDN) represents a network architecture that offers a separate control and data layer, facilitating its rapid deployment and utilization for diverse purposes. However, despite its ease of implementation, SDN is susceptible to numerous security attacks, primarily stemming from its centralized nature. READ MORE