新手上路
2025-12-17 09:16
主楼
1000+份计算机paper,卡耐基梅隆大学,哈佛,斯坦福,芝加哥大学,MIT,facebook,google,微软,Amazon,twitter等大牛一作
- README.md
- 中间件很重要
- 《A Distributed Redis Framework for Use in the UCWW》.pdf
- 《A Forensic Analysis Method for Redis Database based on RDB and AOF File》.pdf
- 《A High Performance Memory Key-Value Database Based on Redis》.pdf
- 《Adaptive replica consistency policy for Kafka》.pdf
- 《An Improved Multimedia Conference System with Load Balance》.pdf
- 《Application and Implementation of Batch File Transfer in Redis Storage》.pdf
- 《Application of MongoDB Technology in NoSQL Database in Video Intelligent Big Data Analysis》.pdf
- 《Automatic mapping of MySQL databases to NoSQL MongoDB》.pdf
- 《Autopsy of a MySQL automation disaster》.pdf
- 《Consistency Models of NoSQL Databases》.pdf
- 《Contrail Architecture》.pdf
- 《Database Caching Strategies Using Redis AWS Whitepaper》.pdf
- 《Database technology for the 2020s》.pdf
- 《Deploying a multi-region, highly available MySQL architecture》.pdf
- 《Doing database design with MySQL 》.pdf
- 《Enhancing m-learning using GridFS for storing and streaming digital content》.pdf
- 《Enlightening the IO Path:Enlightening the IO Path》.pdf
- 《Fault-Tolerant Replication with Pull-Based Consensus in MongoDB》.pdf
- 《Full-Text Search Engine using MySQL》.pdf
- 《Hyperbolic Caching Flexible Caching for Web Applications》.pdf
- 《Identifying Unexpected Internet Services》.pdf
- 《Improvement in Load Balancing Technique for MongoDB Clusters》.pdf
- 《Improving the performance of big data databases》.pdf
- 《InnoDB Database Forensics Reconstructing Data Manipulation Queries from Redo Logs》.pdf
- 《InnoDB to MyRocks migration in main MySQL database at Facebook》.pdf
- 《Kafka a Distributed Messaging System for Log Processing》.pdf
- 《Kafka versus RabbitMQ》.pdf
- 《Logical Distributed Counting for Scalable File Access》.pdf
- 《MONGODB VS MYSQL A Comparative Study of:MongoDB and MySQL Based on Their Performance》.pdf
- 《Making Network Stack Part of the Virtualized Infrastructure》.pdf
- 《Making Volatile Index Structures Persistent with DRAM-NVMM Tiering》.pdf
- 《MegaPipe A New Programming Interface for Scalable Network IO》.pdf
- 《Mesh compacting memory management for C C++ applications》.pdf
- 《MongoDB Database Administration》.pdf
- 《MySQL Cluster Internal Architecture》.pdf
- 《MySQL V5 – Ready for Prime Time Business Intelligence》.pdf
- 《MySQL based selection of appropriate indexing technique in hospital system using multiclass SVM》.pdf
- 《NVMOVE Helping Programmers Move to Byte-Based Persistence》.pdf
- 《Nginx cluster distribution strategy based on request load information》.pdf
- 《Oracle MySQL Database Service with HeatWave Query Accelerator》.pdf
- 《Persisting Objects in Redis Key-Value Database》.pdf
- 《Practical Perl Tools Redis Meet Perl》.pdf
- 《Providing R-Tree Support for MongoDB》.pdf
- 《Realization of the Low Cost and High Performance MySQL Cloud Database》.pdf
- 《Reconstructing Software IO Path with Failure-Atomic Memory-Mapped Interface》.pdf
- 《Recovery Principles of MySQL Cluster 5.1》.pdf
- 《Revisiting Concurrency in High-Performance NoSQL Databases》.pdf
- 《SQL Transactions》.pdf
- 《Scaling Memcache at Facebook》.pdf
- 《Selection and Use of MySQL in a Database Management Course》.pdf
- 《Study and Optimization Based on MySQL Storage Engine》.pdf
- 《Testing Database Engines via Pivoted Query Synthesis》.pdf
- 《The Evolution of an Extension Language A History of Lua》.pdf
- 《The Homeostasis Protocol Avoiding Transaction Coordination Through Program Analysis》.pdf
- 《The Improvement and Implementation of the High Concurrency Web Server Based on Nginx》.pdf
- 《Towards Scalable and Reliable In-Memory Storage System A Case Study with Redis》.pdf
- 《Tunable Consistency in MongoDB》.pdf
- 《Unifying Timestamp with Transaction Ordering for MVCC with Decentralized Scalar Timestamp》.pdf
- 《Using Internal MySQL InnoDB B-Tree Index Navigation for Data Hiding》.pdf
- 《Using Internal MySQLInnoDB B-Tree Index Navigation for Data Hiding Purposes》.pdf
- 《Write Dependency Disentanglement with Horae》.pdf
- 《Zero-Downtime Rebalancing and Data Migration of a Mature Multi-Shard Platform》.pdf
- 接近原始的LinuxOS
- 《A Case for NUMA-aware Contention Management on Multicore Systems》.pdf
- 《A Study on Real-time Responsiveness on Virtualization based Multi-OS Embedded Systems》.pdf
- 《An Evaluation of Coarse-Grained Locking for Multicore Microkernels》.pdf
- 《An Evolutionary Study of Linux Memory Management for Fun and Profit》.pdf
- 《An Experimental Comparison Analysis of Kernel-level Memory Allocators》.pdf
- 《Android OS CASE STUDY》.pdf
- 《Applications of RCU》.pdf
- 《BKL One Lock to Bind Them All》.pdf
- 《Black-box Concurrent Data Structures for NUMA Architectures》.pdf
- 《Breaking the Big LockA Look at Symmetric Multiprocessing in UNIX》.pdf
- 《Cache Coherence Protocols in NUMA Multipro-cessors》.pdf
- 《Demystifying the Real-Time Linux Scheduling Latency》.pdf
- 《Evaluating IPv6 in Peer-to-Peer Gigabit Ethernet for TCP using Modern Windows and Linux Systems An Empirical Study》.pdf
- 《Fractal Properties of Linux Kernel Maps》.pdf
- 《High Performance Computing for Science and Engineering》.pdf
- 《IO Performance Isolation Analysis and Optimization on Linux Containers》.pdf
- 《Implementation of DPDK based TCPIP protocols stack for OS Linux》.pdf
- 《Improving performance on NUMA systems》.pdf
- 《K-Miner Uncovering Memory Corruption in Linux》.pdf
- 《KTLS Linux Kernel Transport Layer Security》.pdf
- 《Linux Kernel Support for IEEE 1588 Hardware Timestamping》.pdf
- 《Linux kernel vulnerabilitiesState-of-the-art defenses and open problems》.pdf
- 《Linux multi-core scalability》.pdf
- 《Magazines and VmemExtending the Slab Allocator to Many CPUs and Arbitrary Resources》.pdf
- 《NUMA aware heap memory manager》.pdf
- 《OpenPiton+Ariane The First Open-Source, SMP Linux-booting RISC-V System Scaling From One to Many Cores》.pdf
- 《Overview of Linux Vulnerabilities》.pdf
- 《Performance Analysis of UMA and NUMA Models》.pdf
- 《Practical Safe Linux Kernel Extensibility》.pdf
- 《Quantifying the performance degradation of IPv6 for TCP in windows and Linux networking》.pdf
- 《RedHat Enterprise Linux NUMA support for HPEProLiant servers》.pdf
- 《Research of Performance Linux Kernel File Systems》.pdf
- 《Research on Load Balancing and Database Replication based on Linux》.pdf
- 《SLAKE Facilitating Slab Manipulation for Exploiting Vulnerabilities in the Linux Kernel》.pdf
- 《SMP Scalability Comparisons of Linux® Kernels 2.2.14 and 2.3.99》.pdf
- 《Slab allocators in the Linux KernelSLAB, SLOB, SLUB》.pdf
- 《Small Kernels Like Big Locks》.pdf
- 《The Linux Scheduler a Decade of Wasted Cores》.pdf
- 《The Slab AllocatorAn Object-Caching Kernel Memory Allocator》.pdf
- 《The locking infrastructure in the FreeBSD kernel》.pdf
- 《The real-time Linux kernel a Survey on PREEMPT_RT》.pdf
- 《Understanding TheLinux Virtual Memory Manager》.pdf
- 《VMPmonitor:An Efficient Modularity Approach for Hidden Process Detection》.pdf
- 《vScale Automatic and Efficient Processor Scaling for SMP Virtual Machines》.pdf
- 数据结构
- 《A Declarative Query Language for Data Provenance》.pdf
- 《A Hierarchical Bloom Filter Index with Applications to Distributed Data Provenance》.pdf
- 《A Model for Learned Bloom Filters,and Optimizing by Sandwiching》.pdf
- 《A Multi-attribute Data Structure with Parallel Bloom Filters for Network Services》.pdf
- 《Accelerating Braided B+ Tree Searches on a GPU with CUDA》.pdf
- 《Acoustics to the Rescue Physical Key Inference Attack Revisited》.pdf
- 《Adaptive Learned Bloom Filter (Ada-BF) Efficient Utilization of the Classifier with Application to Real-Time Information Filtering on the Web》.pdf
- 《An Improved Construction for Counting Bloom Filters》.pdf
- 《An Introduction to Bε-trees and Write-Optimization》.pdf
- 《Analysis of Encryption Algorithms to Basic Operations on Outsourced B+ Data Privacy》.pdf
- 《Analysis_of_B-tree_data_structure_and_its_usage_in_computer_forensics》.pdf
- 《B+ TREES》.pdf
- 《Benchmarking a B-tree compression method》.pdf
- 《Blitz Secure Multi-Hop Payments Without Two-Phase Commits》.pdf
- 《Bloom Filters Design Innovations and Novel Applications》.pdf
- 《Bloom Filters in Adversarial Environments》.pdf
- 《Bloom Filters – Short Tutorial》.pdf
- 《Bloom Filters》.pdf
- 《Bp-Tree A Predictive B+-Tree for Reducing Writes on Phase Change Memory》.pdf
- 《Cache Efficient Bloom Filters for Shared Memory Machines》.pdf
- 《Cache-, Hash- and Space-Efficient Bloom Filters》.pdf
- 《Caches and Hash Trees for Efficient Memory Integrity Verification》.pdf
- 《Compressed Bloom Filters》.pdf
- 《Constructing Red-Black Trees》.pdf
- 《Cuckoo Filter Practically Better Than Bloom》.pdf
- 《Data Step Hash Objects as Programming Tools》.pdf
- 《Deletion The curse of the red-black tree》.pdf
- 《Detailed Provenance Metadata from Statistical Analysis Software》.pdf
- 《Efficient Sparse Merkle Trees Caching Strategies and Secure (Non-)Membership Proofs》.pdf
- 《Efficient Update Control of Bloom Filter Replicas in Distributed Systems》.pdf
- 《Enhancing the B tree by Dynamic Node Popularity Caching》.pdf
- 《Experimental B+-tree for GPU》.pdf
- 《Feature Hashing for Large Scale Multitask Learning》.pdf
- 《Hash, displace, and compress》.pdf
- 《Hash-routing Schemes for Information Centric Networking Hash Join Algorithms for Multi-core CPUs》.pdf
- 《Hash-routing Schemes for Information Centric Networking》.pdf
- 《How to Break MD5 and Other Hash Functions》.pdf
- 《HyperChromatic trees a fine-grained approach to distributed algorithms on RedBlack trees》.pdf
- 《Ideal Hash Trees》.pdf
- 《Implementing Deletion in B+-Trees》.pdf
- 《Incrementally Distributed B+ Challenges》.pdf
- 《Inexpensive Brainwave Authentication New Techniques and Insights on User Acceptance》.pdf
- 《Introduction to Red Black Trees》.pdf
- 《Jungle Towards Dynamically Adjustable Key-Value Store by Combining LSM-Tree and Copy-On-Write B+-Tree》.pdf
- 《Learned Hash-Index A Collision Competition》.pdf
- 《Left-Leaning Red-Black Trees》.pdf
- 《Lock-Free Red-Black Trees Using CAS》.pdf
- 《Making B+-Trees Cache Conscious in Main Memory》.pdf
- 《MilliSort and MilliQuery Large-Scale Data-Intensive Computing in Milliseconds》.pdf
- 《Modern B-Tree Techniques》.pdf
- 《Network Applications of Bloom Filters A Survey》.pdf
- 《Obfuscation-Resilient Executable Payload Extraction From Packed Malware》.pdf
- 《Optimal Parameter Selection for Efficient Memory Integrity Verification Using Merkle Hash Trees》.pdf
- 《Persistent B+-Trees in Non-Volatile Main Memory》.pdf
- 《Persistent Bloom Filter Membership Testing for the Entire History》.pdf
- 《Prefix Hash Tree An Indexing Data Structure over Distributed Hash Tables》.pdf
- 《Provenance expressiveness benchmarking on non-deterministic executions》.pdf
- 《Red-Black Trees with Types》.pdf
- 《Red-Black trees》.pdf
- 《Red-black and AA trees》.pdf
- 《Red-black trees CSS230》.pdf
- 《Red-black trees with relative node keys》.pdf
- 《Red_Black_Trees_Final》.pdf
- 《Relaxed Red-Black Trees with Group Updates》.pdf
- 《Role of Bloom Filter in Big Data Research A Survey》.pdf
- 《Scalable Bloom Filters》.pdf
- 《Selecting a Hashing Algorithm》.pdf
- 《Social Hash Partitioner A Scalable Distributed Hypergraph Partitioner》.pdf
- 《Specification of Red-Black Trees:Specification of Red-Black Trees》.pdf
- 《Swiped Analyzing Ground-truth Data of a Marketplace for Stolen Debit and Credit Cards》.pdf
- 《The Adaptive Radix Tree:ARTful Indexing for Main-Memory Databases》.pdf
- 《The Bw-Tree A B-tree for New Hardware Platforms》.pdf
- 《The Ubiquitous B-Tree》.pdf
- 《Trees-Morris》.pdf
- 《Trie An Alternative Data Structure for Data Mining Algorithms》.pdf
- 《Type-Safe Modular Hash-Consing》.pdf
- 《Understanding Bloom Filter Intersection Caching Strategies and Secure (Non-)Membership Proofs》.pdf
- 《Verification of B+ Trees An Experiment Combining Shape Analysis and Interactive Theorem Proving》.pdf
- 《Verkle Trees》.pdf
- 《Weaponizing Middleboxes for TCP Reflected Amplification》.pdf
- 《Weighted Bloom Filter》.pdf
- 《Workload Aware B+ Trees》.pdf
- 《YARIX Scalable YARA-based Malware Intelligence》.pdf
- 《red_black_tree》.pdf
- 牛B的基础组件
- 《A C++17 Thread Pool for High-Performance Scientific Computing》.pdf
- 《A Comparative Study of Database Connection Pooling Strategy》.pdf
- 《A Design Framework for Highly Concurrent Systems》.pdf
- 《A Lock-Free, Cache-Efficient Multi-Core Synchronization Mechanism for Line-Rate Network Traffic Monitoring》.pdf
- 《A Lock-Free, Cache-Efficient Shared Ring Buffer for Multi-Core Architectures》.pdf
- 《A New Method in Improving Database Connection Pool Model 》.pdf
- 《A Programming Interface for Scalable Network Socket IO》.pdf
- 《A Verified Protocol Buffer Compiler》.pdf
- 《An optimistic approach to lock-free FIFO queues》.pdf
- 《Analyzing Parallel Real-Time Tasks Implemented with Thread Pools》.pdf
- 《Auto-Tuned Threading for OLDI Microservices》.pdf
- 《CASPAR Breaking Serialization in Lock-Free Multicore Synchronization》.pdf
- 《Choosing the serialization protocol for software development》.pdf
- 《Datacenter Tax Cuts Improving WSC Efficiency 》.pdf
- 《Distributed queues in shared memory multicore performance and scalability through quantitative relaxation》.pdf
- 《ECS with NGINX (OpenResty)》.pdf
- 《EQueue Elastic Lock-Free FIFO Queue for Core-to-Core Communication on Multi-Core Processors》.pdf
- 《Evaluating and Optimizing Thread Pool Strategies for Real-Time CORBA》.pdf
- 《Evaluation of the Impact of Cache Coherence Protocol and Data Locality on the Efficiency of Atomic Operations on Multicore Processors》.pdf
- 《HBase Connection Dynamic Keeping Method Based on Reactor Pattern》.pdf
- 《Hardlock Real-time multicore locking》.pdf
- 《Hashed and Hierarchical Timing Wheels Efficient Data Structures for Implementing a Timer Facility》.pdf
- 《Hybrid Synchronization Based Distributed Thread Pool》.pdf
- 《Implementation of multiple thread pools based on distribution of service times by Riaz Shah》.pdf
- 《Implementing Lock-Free Queues》.pdf
- 《Improving Response Time of Authorization Process of Credit Card System Using Multi-Threading and Shared-Memory Pool Techniques》.pdf
- 《Improving WSC Efficiency Through Protocol Buffer 》.pdf
- 《Lock-Free and Wait-Free Slot Scheduling Algorithms》.pdf
- 《Modeling and Analysis of Thread-Pools》.pdf
- 《Multicore Locks The Case Is Not Closed Yet》.pdf
- 《Performance Analysis and Evaluation of Database Connection Pool Technology Based on Queueing Model》.pdf
- 《Performance Comparison of Messaging Protocols and Serialization Formats for Digital Twins in IoV》.pdf
- 《Performance Study and Dynamic Optimization Design for Thread Pool Systems》.pdf
- 《Performance evaluation of using Protocol Buffers in the Internet of Things communication》.pdf
- 《Prediction and Frequency Based Dynamic Thread Pool System A Hybrid Model》.pdf
- 《ProIO An Event-Based IO Stream Format for Protobuf Messages》.pdf
- 《Programming with Threads》.pdf
- 《Real-Time Stream Processing in Java》.pdf
- 《Scalable Queue-Based Spin Locks with Timeout》.pdf
- 《Software debugging techniques》.pdf
- 《The Mutual Exclusion Problem Part II Statement and Solutions》.pdf
- 《The Problem of Mutual Exclusion A New Distributed Solution》.pdf
- 《The java.util.concurrent synchronizer framework》.pdf
- 《The shared-thread multiprocessor》.pdf
- 《Universal wait-free memory reclamation》.pdf
- 《Using Protocol Buffers for Resource-Constrained Distributed Embedded Systems》.pdf
- 《Wait-free queues with multiple enqueuers and dequeuers》.pdf
- 《libcppa - Designing an Actor Semantic for C++11》.pdf
- 网络编程那些事儿
- 《A Centralized “Zero-Queue” Datacenter Network》.pdf
- 《A Comprehensive Overview of TCP Congestion Control in 5G Networks Research Challenges and Future Perspectives》.pdf
- 《A Decision-Analytic Approach for P2P Cooperation Policy Setting》.pdf
- 《A Design and Implementation of Active Network Socket Programming 》.pdf
- 《A High-Performance Implementation of an IoT System Using DPDK》.pdf
- 《A Look Back at “Security Problems in the TCPIP Protocol Suite”》.pdf
- 《A P2P VIDEO DELIVERY NETWORK (P2P-VDN)》.pdf
- 《A Scriptable High-Speed Packet Generator》.pdf
- 《A Simple Model for Analyzing P2P Streaming Protocols》.pdf
- 《A Simpler and Faster NIC Driver Model for Network Functions》.pdf
- 《A Survey of Asynchronous Programming Using Coroutines in the Internet of Things and Embedded Systems》.pdf
- 《A component-based approach to the design of networked control systems》.pdf
- 《A proposal to add coroutines to the C++ standard library (Revision 1)》.pdf
- 《A verified abstract machine for functional coroutines》.pdf
- 《Adding async RAII support to coroutines》.pdf
- 《An Adaptive Throughput-First Packet Scheduling Algorithm for DPDK-Based Packet Processing Systems》.pdf
- 《An Experiment of Container Networking using OpenVSwitch-DPDK》.pdf
- 《An Experimental review on Intel DPDK L2 Forwarding》.pdf
- 《Attaining the Promise and Avoiding the Pitfalls of TCP in the Datacenter》.pdf
- 《Base of the Networking Protocol – TCPIP Its Design and Security Aspects》.pdf
- 《Beej’s Guide to Network Programming》.pdf
- 《Bitcoin A Peer-to-Peer Electronic Cash System》.pdf
- 《Combining TCP and UDP for Secure Data Transfer》.pdf
- 《Comparative Evaluation of Kernel Bypass Mechanisms for High-performance Inter-container Communications》.pdf
- 《Configtron Tackling network diversity with heterogeneous configurations》.pdf
- 《Coroutines TS for C++2a》.pdf
- 《DPDK based Improvement of Packet Forwarding》.pdf
- 《Designs and Evaluation of a Tracker in P2P Networks》.pdf
- 《Developing DPDK-Accelerated Virtual Switch Solutions for Cloud Service Providers》.pdf
- 《Dissecting Performance of Production QUIC》.pdf
- 《Embedding Covert Channels into TCPIP》.pdf
- 《Evaluating Predictors of Congestion Collapse in Communication Networks》.pdf
- 《Exploiting DPDK in Containerized Environment with Unsupported Hardware》.pdf
- 《FloWatcher-DPDK lightweight line-rate flow-level monitoring in software》.pdf
- 《Full TCPIP for 8-Bit Architectures》.pdf
- 《High-speed Software Data Plane via Vectorized Packet Processing》.pdf
- 《Incremental Approach Coroutine TS + Core Coroutines》.pdf
- 《Innovating Transport with QUIC Design Approaches and Research Challenges》.pdf
- 《Interaction between TCP and UDP flows in Wireless Multi-hop Ad hoc Networks》.pdf
- 《Introduction to TCPIP Network Attacks》.pdf
- 《JAVA NETWORK PROGRAMMING USING SOCKET》.pdf
- 《Kademlia A Peer-to-peer Information System Based on the XOR Metric》.pdf
- 《MIMIQ Masking IPs with Migration in QUIC》.pdf
- 《NetKAT Semantic Foundations for Networks》.pdf
- 《Network Application Frameworks》.pdf
- 《Network Functions Virtualisation。.pdf
- 《Network Programming in Age of Empires and Beyond 》.pdf
- 《Network Programming》.pdf
- 《OReilly - Java Network Programming 2ed》.pdf
- 《Observations of UDP to TCP Ratio and Port Numbers》.pdf
- 《Operational Semantics for Declarative Networking》.pdf
- 《P2P File-Sharing in Hell Exploiting BitTorrent Vulnerabilities to Launch Distributed Reflective DoS Attacks》.pdf
- 《Payload Caching High-Speed Data Forwarding for Network Intermediaries》.pdf
- 《Peer-to-Peer (P2P) File Sharing Applications and their Threat to the Corporate Environment》.pdf
- 《Peer-to-Peer Architecture Case Study Gnutella Network》.pdf
- 《Performance of TCPIP Over Next Generation Broadband Wireless Access Networks》.pdf
- 《Performance of UDP and TCP Communication on Personal Computers》.pdf
- 《Performant TCP for Low-Power Wireless Networks》.pdf
- 《Portable Desktop Applications Based on P2P Transportation and Virtualization》.pdf
- 《Proceedings of the First Symposium onNetworked Systems Design and Implementation》.pdf
- 《Protocol Independence Using the Sockets API》.pdf
- 《Reflections on Active Networking》.pdf
- 《Reliable Blast UDP Predictable High Performance Bulk Data Transfer》.pdf
- 《Research on Computer Programming Optimization System Based on Big Data Technology》.pdf
- 《Revisiting Coroutines》.pdf
- 《SNP An Interface for Secure Network Programming》.pdf
- 《Scalable Network IO in Linux》.pdf
- 《Scalable TCP Throughput Limitation Monitoring》.pdf
- 《Secure WWW Transactions Using Standard HTTP and Java Applets》.pdf
- 《Self-Stabilizing Structured Ring Topology P2P Systems》.pdf
- 《ShieldBox Secure Middleboxes using Shielded Execution》.pdf
- 《Slipstream Automatic Interprocess Communication Optimization》.pdf
- 《Socket Programming 》.pdf
- 《SoftNIC A Software NIC to Augment Hardware》.pdf
- 《StackMap Low-Latency Networking with the OS Stack and Dedicated NICs》.pdf
- 《TCPIP Acceleration for Telco Cloud》.pdf
- 《TCPIP Overview》.pdf
- 《TRANSMISSION CONTROL PROTOCOL》.pdf
- 《Taking a Long Look at QUIC》.pdf
- 《The Benefits and Costs of Writing a POSIX Kernel in a High-Level Language》.pdf
- 《The Networks of Reinvention》.pdf
- 《The QUIC Transport Protocol:Design and Internet-Scale Deployment》.pdf
- 《The Secure Socket API TLS as an Operating System Service》.pdf
- 《The Secure Socket API TLS as an Operating System Service(USENIX)》.pdf
- 《Toward Efficient Querying of Compressed Network Payloads》.pdf
- 《Towards Securing the Internet of Things with QUIC》.pdf
- 《Towards including batch services in models for DPDK-based virtual switches》.pdf
- 《TrapezeIP TCPIP at Near-Gigabit Speeds》.pdf
- 《UHD-DPDK Performance Analysis for Advanced Software Radio Communications》.pdf
- 《User Space Network Drivers》.pdf
- 《Using TCPIP traffic shaping to achieve iSCSI service predictability》.pdf
- 《View on 5G Architecture》.pdf
- 《Virtual Router Design and Modeling for Future Networks with QoS Guarantees》.pdf
- 《Virtual Switch Acceleration with OVS-TC》.pdf
- 《adaptive and precise intermittent packet retrieval in DPDK》.pdf
- 《intel dpdk vsphere solution brief》.pdf
- 《mTCP A Highly Scalable User-level TCP Stack for Multicore Systems》.pdf
- 《netmap Memory Mapped Access To Network Devices》.pdf
- 《netmap a novel framework for fast packet IO》.pdf
- 《packetdrill Scriptable Network Stack Testing, from Sockets to Packets》.pdf
- 高大上的分布式
- 1.txt
- 《A Comparative Study of Microservices-based IoT Platforms》.pdf
- 《A Lightweight and High Performance Remote Procedure Call Framework for Cross Platform Communication》.pdf
- 《A Survey on Docker Container and its Use Cases》.pdf
- 《A Systematic Literature Review on Microservices》.pdf
- 《A distributed systems platform for mobile computing》.pdf
- 《AN APPROACH OF EXPLOITING DOCKER AN APPROACH OF EXPLOITING DOCKER》.pdf
- 《Accelerating TensorFlow with Adaptive RDMA-based gRPC》.pdf
- 《An Introduction to Docker and Analysis of its Performance》.pdf
- 《An Updated Performance Comparison of Virtual Machines and Linux Containers》.pdf
- 《An introduction to Docker for reproducible research, with examples from the R environment》.pdf
- 《Architectural Patterns for Microservices A Systematic Mapping Study》.pdf
- 《Assise Performance and Availability via Client-local NVM in a Distributed File System》.pdf
- 《Availability and Scalability Optimized Microservice Discovery from Enterprise Systems》.pdf
- 《Beats-Per-Minute (BPM) A Microservice-based Platform for the Monitoring of Health Related Data via Activity Trackers》.pdf
- 《Building Reliable Distributed Systems》.pdf
- 《Business Object Centric Microservices Patterns》.pdf
- 《Ceph A Scalable, High-Performance Distributed File System》.pdf
- 《Challenges in Storing Docker Images》.pdf
- 《Challenges of Microservices Architecture A Survey on the State of the Practice》.pdf
- 《Confine Automated System Call Policy Generation for Container Attack Surface Reduction》.pdf
- 《Containerized Microservices architecture》.pdf
- 《Continuous Software Engineering – A Microservices Architecture Perspective》.pdf
- 《Datacenter RPCs Can Be General and Fast》.pdf
- 《Development of deployment management system to solve microservices deployment complexity and runtime scalability challenges》.pdf
- 《Devops and Microservices Based Internet of Things Meta-Model》.pdf
- 《Distributed Network computing over local ATM Networks》.pdf
- 《Distributed systems support for adaptive mobile applications》.pdf
- 《Docker Container based PaaS Cloud Computing Comprehensive Benchmarks using LAPACK》.pdf
- 《Docker Container》.pdf
- 《Docker Super Cluster V20》.pdf
- 《Docker and KubernetesChanging the OpenText Documentum deployment model》.pdf
- 《Docker ecosystem – Vulnerability Analysis》.pdf
- 《DupHunter Flexible High-Performance Deduplication for Docker Registries》.pdf
- 《Dynamic Load Balancing in Ceph》.pdf
- 《Enabling Serverless Deployment of Large-Scale AI Workloads》.pdf
- 《Experience with Rules-Based Programming for Distributed, Concurrent, Fault-Tolerant Code》.pdf
- 《File Systems Unfit as Distributed Storage Back Ends》.pdf
- 《Impact of etcd deployment on Kubernetes, Istio, and application performance》.pdf
- 《Implementing Remote Procedure Calls》.pdf
- 《Improving Docker Registry Design based on Production Workload Analysis》.pdf
- 《In Reference to RPC:It’s Time to Add Distributed Memory》.pdf
- 《Interactive RPC Binding Model》.pdf
- 《Interchangeable Scheduling Policies in Real-Time Middleware for Distribution》.pdf
- 《Kubernetes Towards Deployment of Distributed IoT Applications in Fog Computing》.pdf
- 《Large-Scale Cloud Service Using Ceph》.pdf
- 《Load Balancing using Docker and Kubernetes A Comparative Study》.pdf
- 《Making containers lazy with Docker and CernVM-FS》.pdf
- 《Managing Applications in Docker Containers》.pdf
- 《Microservices Architecture and Technologies》.pdf
- 《Microservices Architecture for Modern Digital Platforms》.pdf
- 《Microservices in Practice A Survey Study》.pdf
- 《Modern System Administration with Go and Remote Procedure Calls (RPC)》.pdf
- 《Modular Composition of Coordination Services》.pdf
- 《Oracle WebLogic Server on Docker Containers》.pdf
- 《PERFORMANCE OF ENTERPRISE WEB APPLICATIONS IN DOCKER CONTAINERS ON VMWARE VSPHERE 6.5》.pdf
- 《Panduan Mudah OKD - OpenShift》.pdf
- 《RATATOSKR WIDE-AREA ACTUATOR RPC OVER GRIDSTAT WITH TIMELINESS,REDUNDANCY, AND SAFETY》.pdf
- 《Reducing the IoT security breach witha microservice architecture based on TLS and OAuth2》.pdf
- 《Replicating data objects in large distributed database systems an axiomatic game theoretic mechanismdesign approach》.pdf
- 《Research on Interprocess Communication in Microservices Architecture》.pdf
- 《SkyhookDM Data Processing in Ceph with Programmable Storage》.pdf
- 《Slacker Fast Distribution with Lazy Docker Containers》.pdf
- 《Study of Container-Based Virtualisation and Threats in Fog Computing》.pdf
- 《Supporting Docker in Emulab-Based Network Testbeds》.pdf
- 《Taking the Cloud-Native Approach with Microservices》.pdf
- 《Test automation in microservice architecture》.pdf
- 《Understanding Docker》.pdf
- 《Understanding the Security Risks of Docker Hub》.pdf
- 《Using Docker Containers to Improve Reproducibility in Software and Web Engineering Research》.pdf
- 《Using gRPC with Go》.pdf
- 《Value-Based Allocation of Docker Containers》.pdf
- 《Virtualization Using Docker Containers For Reproducible Environments and Containerized Applications》.pdf
- 《Virtualization of Radio Access Network by Virtual Machine and Docker Practice and Performance Analysis》.pdf
- 《vNFS Maximizing NFS Performance with Compounds and Vectorized IO》.pdf
所有权归 github.com/0voice/computer_expert_paper 拥有。本站仅提供github文件链接,不对仓库内容负责