Login / Signup
A Survey of Kernel-Bypass Techniques in Network Stack.
Ruining Chen
Guoao Sun
Published in:
CSAI/ICIMT (2018)
Keyphrases
</>
computer networks
network model
kernel function
network structure
kernel methods
data sets
social networks
peer to peer
complex networks
network architecture
face recognition
support vector
network traffic
gaussian processes
component analysis