期刊文献+
共找到510篇文章
< 1 2 26 >
每页显示 20 50 100
VARIABLE-RATE MULTIUSER DIVERSITY IN CORRELATED MIMO CHANNEL VIA VIRTUAL CHANNEL REPRESENTATION
1
作者 Tang Lan You Xiaohu Liang Yingchang 《Journal of Electronics(China)》 2006年第3期332-337,共6页
This paper studies the multiuser diversity with constellation selection based on a virtual representation of realistic Multiple Input Multiple Output (MIMO) correlated channels. To realize multiuser diversity in slo... This paper studies the multiuser diversity with constellation selection based on a virtual representation of realistic Multiple Input Multiple Output (MIMO) correlated channels. To realize multiuser diversity in slow fading channels, random beamforming is adopted. Random beamforming matrix exploiting virtual channel representation is constructed, which can match the channel matrix of the desired user better. Sirnultaneously, adaptive coded modulation is applied to each sub-channel of the selected user to improve the system performance further. 展开更多
关键词 Multiple Input Multiple Output (MIMO) Correlated channel virtual channel BEAMFORMING Multiuser diversity Adaptive modulation
在线阅读 下载PDF
Virtual channel load-balanced routing algorithm for Torus networks 被引量:1
2
作者 WANG Ya-gang DU Hui-min SHEN Xu-bang 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2011年第1期70-76,共7页
In order to improve the network performance furthermore, a routing algorithm for 2D-Torus is investigated from the standpoint of load balance for virtual channels. The 2D-Torus network is divided into two virtual netw... In order to improve the network performance furthermore, a routing algorithm for 2D-Torus is investigated from the standpoint of load balance for virtual channels. The 2D-Torus network is divided into two virtual networks and each physical channel is split into three virtual channels. A novel virtual channel allocation policy and a routing algorithm are proposed, in which traffic load is distributed to those three virtual channels in a more load-balanced manner by introducing a random parameter. Simulations of the proposed algorithm are developed with a SystemC-based test bench. The results show that compared with the negative first for Torus networks (NF-T) algorithm, the proposed algorithm can achieve better performance in terms of network latency and throughput under different traffic patterns. It also shows that a routing algorithm with load balance for virtual channels can significantly improve the network performance furthermore. 展开更多
关键词 interconnection network Torus networks routing algorithm virtual channel load balance
原文传递
Fault-Tolerant Wormhole Routing with 2 Virtual Channels in Meshes
3
作者 周继鹏 《Journal of Computer Science & Technology》 SCIE EI CSCD 2005年第6期822-830,共9页
In wormhole meshes, a reliable routing is supposed to be deadlock-free and fault-tolerant. Many routing algorithms are able to tolerate a large number of faults enclosed by rectangular blocks or special convex, none o... In wormhole meshes, a reliable routing is supposed to be deadlock-free and fault-tolerant. Many routing algorithms are able to tolerate a large number of faults enclosed by rectangular blocks or special convex, none of them, however, is capable of handling two convex fault regions with distance two by using only two virtual networks. In this paper, a fault-tolerant wormhole routing algorithm is presented to tolerate the disjointed convex faulty regions with distance two or no less, which do not contain any nonfaulty nodes and do not prohibit any routing as long as nodes outside faulty regions are connected in the mesh network. The processors' overlapping along the boundaries of different fault regions is allowed. The proposed algorithm, which routes the messages by X-Y routing algorithm in fault-free region, can tolerate convex fault-connected regions with only two virtual channels per physical channel, and is deadlock- and livelock-free. The proposed algorithm can be easily extended to adaptive routing. 展开更多
关键词 disjoint fault-connected region deadlock freedom fault-tolerant wormhole routing virtual channel
原文传递
Blind Channel Identification for Cyclic-Prefixed MIMO-OFDM Systems with Virtual Carriers 被引量:3
4
作者 Jung-Lang Yu Biling Zhang +1 位作者 Yipu Yuan Wei-Ting Hsu 《China Communications》 SCIE CSCD 2020年第3期101-116,共16页
This paper applies the repetition index scheme(RIS)to the channel identification of cyclic prefixed(CP)multiple-input multiple-output orthogonal frequency division multiplexing(MIMO-OFDM)systems with virtual carriers(... This paper applies the repetition index scheme(RIS)to the channel identification of cyclic prefixed(CP)multiple-input multiple-output orthogonal frequency division multiplexing(MIMO-OFDM)systems with virtual carriers(VCs)in the environment of the number of receive antennas being no less than that of transmit antennas.The VCs will cause a rank deficiency problem in computing the subspace information.With the subcarrier mapping matrix,the received signal is simplified to remove the rank deficiency.We use the RIS scheme to generate many times of equivalent symbols so the channel identification can converge with few received OFDM blocks.The RIS scheme will convert the white noise into non-white noise.With the Cholesky factorization,a noise whitening technique is developed to turn the non-white noise back to white noise.We further analyze the necessary conditions of identifiability of channel estimation.Simulations are performed to show the superiority of the proposed method. 展开更多
关键词 OFDM MIMO virtual CARRIER channel identification Cholesky FACTORIZATION
在线阅读 下载PDF
Pilot Placement for Time-Varying MIMO OFDM Channels with Virtual Subcarriers 被引量:1
5
作者 Alieh Moradi Hamidreza Bakhshi Vahid Najafpoor 《Communications and Network》 2011年第1期31-38,共8页
The rapid time-variation of a fading multipath environment can impair the performance of multiple-input multiple-output orthogonal frequency division multiplexing (MIMO OFDM). This paper proposes a pilot placement met... The rapid time-variation of a fading multipath environment can impair the performance of multiple-input multiple-output orthogonal frequency division multiplexing (MIMO OFDM). This paper proposes a pilot placement method for MIMO OFDM systems under time-varying channels with the guard band. The time-varying channel is described by complex exponential basis expansion model (BEM). We discuss the least square (LS) channel estimation to obtain the minimum mean square error (MSE) and derive the pilot allocation that can satisfy the minimum MSE with regard to guard band in time-varying channels. It is shown that optimal pilot clusters can distribute non-uniformly in frequency domain and minimize the MSE. We generalize our scheme over G OFDM symbols and compare it with comb pilots. It is demonstrated that the proposed approach is more effective than previous work. Simulation results validate our theoretical analysis. 展开更多
关键词 GUARD Band MIMO OFDM PILOT TIME-VARYING channel virtual Subcarriers
在线阅读 下载PDF
Real-Time Timing Channel Detection in a Software-Defined Networking Virtual Environment 被引量:2
6
作者 Anyi Liu Jim X. Chen Harry Wechsler 《Intelligent Information Management》 2015年第6期283-302,共20页
Despite extensive research, timing channels (TCs) are still known as a principal category of threats that aim to leak and transmit information by perturbing the timing or ordering of events. Existing TC detection appr... Despite extensive research, timing channels (TCs) are still known as a principal category of threats that aim to leak and transmit information by perturbing the timing or ordering of events. Existing TC detection approaches use either signature-based approaches to detect known TCs or anomaly-based approach by modeling the legitimate network traffic in order to detect unknown TCs. Un-fortunately, in a software-defined networking (SDN) environment, most existing TC detection approaches would fail due to factors such as volatile network traffic, imprecise timekeeping mechanisms, and dynamic network topology. Furthermore, stealthy TCs can be designed to mimic the legitimate traffic pattern and thus evade anomalous TC detection. In this paper, we overcome the above challenges by presenting a novel framework that harnesses the advantages of elastic re-sources in the cloud. In particular, our framework dynamically configures SDN to enable/disable differential analysis against outbound network flows of different virtual machines (VMs). Our framework is tightly coupled with a new metric that first decomposes the timing data of network flows into a number of using the discrete wavelet-based multi-resolution transform (DWMT). It then applies the Kullback-Leibler divergence (KLD) to measure the variance among flow pairs. The appealing feature of our approach is that, compared with the existing anomaly detection approaches, it can detect most existing and some new stealthy TCs without legitimate traffic for modeling, even with the presence of noise and imprecise timekeeping mechanism in an SDN virtual environment. We implement our framework as a prototype system, OBSERVER, which can be dynamically deployed in an SDN environment. Empirical evaluation shows that our approach can efficiently detect TCs with a higher detection rate, lower latency, and negligible performance overhead compared to existing approaches. 展开更多
关键词 Covert channel TIMING channel INTRUSION Detection virtualIZATION Software-Defined Network
在线阅读 下载PDF
Information Transfer Model of Virtual Machine Based on Storage Covert Channel
7
作者 WANG Xiaorui WANG Qingxian +1 位作者 GUO Yudong LU Jianping 《Wuhan University Journal of Natural Sciences》 CAS 2013年第5期377-384,共8页
Aiming at the problem that virtual machine information cannot be extracted incompletely, we extend the typical information extraction model of virtual machine and propose a perception mechanism in virtualization syste... Aiming at the problem that virtual machine information cannot be extracted incompletely, we extend the typical information extraction model of virtual machine and propose a perception mechanism in virtualization system based on storage covert channel to overcome the affection of the semantic gap. Taking advantage of undetectability of the covert channel, a secure channel is established between vip and virtual machine monitor to pass data directly. The vip machine can pass the control information of malicious process to virtual machine monitor by using the VMCALL instruction and shared memory. By parsing critical information in process control structure, virtual machine monitor can terminate the malicious processes. The test results show that the proposed mechanism can clear the user-level malicious programs in the virtual machine effectively and covertly. Meanwhile, its performance overhead is about the same as that of other mainstream monitoring mode. 展开更多
关键词 virtualIZATION safety protection information extraction of virtual machine covert channel process control structure
原文传递
电力系统节点电压-无功安全域的构建与可视化
8
作者 刘承锡 何再雨 +1 位作者 赖秋频 罗永建 《电工技术学报》 北大核心 2026年第1期156-168,共13页
电力系统的电压-无功安全域对于监测节点电压状态和避免发电机无功出力越限具有重要意义。因此,该文提出一种基于非线性网络分解的节点电压-无功可视化安全域方法,能够实时可视化监测各个节点的电压水平及发电机的无功状态,并预测潜在... 电力系统的电压-无功安全域对于监测节点电压状态和避免发电机无功出力越限具有重要意义。因此,该文提出一种基于非线性网络分解的节点电压-无功可视化安全域方法,能够实时可视化监测各个节点的电压水平及发电机的无功状态,并预测潜在越限事件发生的风险。首先,通过建立两节点虚拟通道对电力系统进行解耦,并引入表征节点电压-无功状态的复数型指标;其次,运用物理性全纯嵌入法(HEM)求解随着系统负荷状态变化时的节点电压-无功状态指标轨迹(SIT);然后,分别推导节点电压和发电机无功出力的安全域边界解析表达式,并将其与节点电压-无功状态指标轨迹在同一复平面内可视化;最后,在不同规模节点系统中验证了所提电力系统节点电压-无功可视化安全域的有效性。 展开更多
关键词 静态安全域 电压安全域 无功安全域 可视化 两节点虚拟通道 全纯嵌入法
在线阅读 下载PDF
基于室内300—330 GHz太赫兹信道测量的感知测距与环境重构
9
作者 林宸洲 孙铄 +3 位作者 邱天 张泰豪 何永超 潘存华 《移动通信》 2026年第2期57-67,共11页
面向6G移动通信网络的ISAC(通信感知一体化)需求,太赫兹通信凭借其超高频和高传输速率优势,被认为是实现毫米级高精度感知的关键技术。然而,当前关于太赫兹感知性能及环境影响因素的实验研究仍较为有限,因此基于300—330 GHz频段构建了... 面向6G移动通信网络的ISAC(通信感知一体化)需求,太赫兹通信凭借其超高频和高传输速率优势,被认为是实现毫米级高精度感知的关键技术。然而,当前关于太赫兹感知性能及环境影响因素的实验研究仍较为有限,因此基于300—330 GHz频段构建了以VNA(矢量网络分析仪)为核心的收发机测量系统,并在紫金山实验室T字型走廊场景中开展了环境重构实验。首先介绍了基于VNA扩频方案的太赫兹频域信道测量系统及原理、校准处理、多径参数估计等数据处理;然后对信道感知、环境测绘与重构进行系统分析,揭示了虚墙现象的产生机理及重构墙面特征的方法,同时分析了后向散射系数在测试场景下的分布特性。实验结果表明,太赫兹频段在测试场景中可实现高精度测距和可靠的二维环境重构,测试环境的平均后向散射系数超过50 dB,为太赫兹感知系统的设计提供了重要的实验支撑。 展开更多
关键词 信道测量 太赫兹通信 环境重构 虚墙 后向散射系数
在线阅读 下载PDF
Neural Network and GBSM Based Time-Varying and Stochastic Channel Modeling for 5G Millimeter Wave Communications 被引量:7
10
作者 Xiongwen Zhao Fei Du +4 位作者 Suiyan Geng Ningyao Sun Yu Zhang Zihao Fu Guangjian Wang 《China Communications》 SCIE CSCD 2019年第6期80-90,共11页
In this work,a frame work for time-varying channel modeling and simulation is proposed by using neural network(NN)to overcome the shortcomings in geometry based stochastic model(GBSM)and simulation approach.Two NN mod... In this work,a frame work for time-varying channel modeling and simulation is proposed by using neural network(NN)to overcome the shortcomings in geometry based stochastic model(GBSM)and simulation approach.Two NN models are developed for modeling of path loss together with shadow fading(SF)and joint small scale channel parameters.The NN models can predict path loss plus SF and small scale channel parameters accurately compared with measurement at 26 GHz performed in an outdoor microcell.The time-varying path loss and small scale channel parameters generated by the NN models are proposed to replace the empirical path loss and channel parameter random numbers in GBSM-based framework to playback the measured channel and match with its environment.Moreover,the sparse feature of clusters,delay and angular spread,channel capacity are investigated by a virtual array measurement at 28 GHz in a large waiting hall. 展开更多
关键词 TIME-VARYING channel NEURAL network CLUSTER channel modeling virtual array measurement 5G
在线阅读 下载PDF
An Effective and Scalable VM Migration Strategy to Mitigate Cross-VM Side-Channel Attacks in Cloud 被引量:3
11
作者 Chao Yang Yunfei Guo +2 位作者 Hongchao Hu Wenyan Liu Yawen Wang 《China Communications》 SCIE CSCD 2019年第4期151-171,共21页
Co-residency of virtual machines(VMs) of different tenants on the same physical platform would possibly lead to cross-VM side-channel attacks in the cloud. While most of current countermeasures fail for real or immedi... Co-residency of virtual machines(VMs) of different tenants on the same physical platform would possibly lead to cross-VM side-channel attacks in the cloud. While most of current countermeasures fail for real or immediate deployment due to their requirement for modification of virtualization structure, we adopt dynamic migration, an inherent mechanism of the cloud platform, as a general defense against this kind of threats. To this end, we first set up a unified practical information leakage model which shows the factors affecting side channels and describes the way they influence the damage due to side-channel attacks. Since migration is adopted to limit the time duration of co-residency, we envision this defense as an optimization problem by setting up an Integer Linear Programming(ILP) to calculate optimal migration strategy, which is intractable due to high computational complexity. Therefore, we approximate the ILP with a baseline genetic algorithm, which is further improved for its optimality and scalability. Experimental results show that our migration-based defense can not only provide excellent security guarantees and affordable performance cost in both theoretical simulation and practical cloud environment, but also achieve better optimality and scalability than previous countermeasures. 展开更多
关键词 side-channel ATTACKS information LEAKAGE virtual machine migration GENETIC algorithm
在线阅读 下载PDF
Multi-Frequency Channel Characterization for Massive MIMO Communications in Lobby Environment 被引量:1
12
作者 Jianzhi Li Bo Ai +2 位作者 Ruisi He Mi Yang Zhangdui Zhong 《China Communications》 SCIE CSCD 2019年第9期79-92,共14页
In this paper,a massive multiple input multiple output(MIMO)channel measurement campaign with two setups is conducted in an indoor lobby environment.In the first setup,two types of 256-element virtual uniform rectangu... In this paper,a massive multiple input multiple output(MIMO)channel measurement campaign with two setups is conducted in an indoor lobby environment.In the first setup,two types of 256-element virtual uniform rectangular arrays(URAs),i.e.,the 4×64 virtual URA and the 64×4 virtual URA are used.The carrier frequency is 11 GHz;in the second setup,measurements are performed at 4,6,11,13,15,18 GHz at two different user locations.The channel characterization is presented by investigating the typical channel parameters,including average power delay profile(APDP),K factor,root mean square(RMS)delay spread,and coherence bandwidth.Moreover,the channel characteristics in angular domain are investigated by applying the space-alternating generalized expectation-maximization(SAGE)algorithm.The extracted multipath components(MPCs)are preliminarily clustered by visual inspection,and related to the interacting objects(IOs)in physical environment.Multipath structures at multiple frequency bands are examined.Direction spread of departure is estimated to evaluate the directional dispersion at the base station(BS)side.The results in this paper can help to reveal the propagation mechanisms in massive MIMO channels,and provide a foundation for the design and application of the practical massive MIMO system. 展开更多
关键词 5G MASSIVE MIMO channelmeasurement virtual array SAGE K factor RMS delay SPREAD coherence bandwidth SCATTERER localization direction SPREAD
在线阅读 下载PDF
Virtual 5G Network Embedding in a Heterogeneous and Multi-Domain Network Infrastructure 被引量:6
13
作者 Cunqian Yu Weigang Hou +2 位作者 Yingying Guan Yue Zong Pengxing Guo 《China Communications》 SCIE CSCD 2016年第10期29-43,共15页
The pursuit of the higher performance mobile communications forces the emergence of the fifth generation mobile communication(5G). 5G network, integrating wireless and wired domain, can be qualified for the complex vi... The pursuit of the higher performance mobile communications forces the emergence of the fifth generation mobile communication(5G). 5G network, integrating wireless and wired domain, can be qualified for the complex virtual network work oriented to the cross-domain requirement. In this paper, we focus on the multi-domain virtual network embedding in a heterogeneous 5G network infrastructure, which facilitates the resource sharing for diverse-function demands from fixed/mobile end users. We proposed the mathematical ILP model for this problem.And based on the layered-substrate-resource auxiliary graph and an effective six-quadrant service-type-judgment method, 5G embedding demands can be classified accurately to match different user access densities. A collection of novel heuristic algorithms of virtual 5G network embedding are proposed. A great deal of numerical simulation results testified that our algorithm performed better in terms of average blocking rate, routing latency and wireless/wired resource utilization, compared with the benchmark. 展开更多
关键词 5G virtual network embedding heterogeneous and multi-domain infrastructure wireless channel capacity data center
在线阅读 下载PDF
Analysis and Comparison of Time Replica and Time Linear Interpolation for Pilot Aided Channel Estimation in OFDM Systems
14
作者 Donglin Wang 《International Journal of Communications, Network and System Sciences》 2010年第5期446-452,共7页
This paper analyzes and compares two time interpolators, i.e., time replica and time linear interpolator, for pilot aided channel estimation in orthogonal frequency division multiplexing (OFDM) systems. The mean squar... This paper analyzes and compares two time interpolators, i.e., time replica and time linear interpolator, for pilot aided channel estimation in orthogonal frequency division multiplexing (OFDM) systems. The mean square error (MSE) of two interpolators is theoretically derived for the general case. The equally spaced pilot arrangement is proposed as a special platform for these two time interpolators. Based on this proposed platform, the MSE of two time interpolators at the virtual pilot tones is derived analytically;moreover, the MSE of per channel estimator at the entire OFDM symbol based on per time interpolator is also derived. The effectiveness of the theoretical analysis is demonstrated by numerical simulation in both the time-invariant frequency-selective channel and the time varying frequency-selective channel. 展开更多
关键词 OFDM channel Estimation TIME REPLICA TIME Linear INTERPOLATION virtual Pilots
在线阅读 下载PDF
基于改进虚拟弹簧模型的无人机路径规划算法研究 被引量:1
15
作者 肖蘅 张汇 +1 位作者 周文 穆震杰 《航空工程进展》 2025年第2期23-30,共8页
由于无人机的路径规划问题以及虚拟弹簧模型(VSM)在路径规划过程中存在目标不可达和狭窄通道易振荡问题,在虚拟弹簧模型的基础上,提出一种改进虚拟弹簧模型的无人机路径规划算法。首先,建立无人机与障碍物的排斥力公式以及无人机与目标... 由于无人机的路径规划问题以及虚拟弹簧模型(VSM)在路径规划过程中存在目标不可达和狭窄通道易振荡问题,在虚拟弹簧模型的基础上,提出一种改进虚拟弹簧模型的无人机路径规划算法。首先,建立无人机与障碍物的排斥力公式以及无人机与目标点的牵引公式,完成无人机的局部路径规划;然后,在虚拟弹簧模型中引入边界力概念,解决无人机狭窄通道易振荡及目标不可达的问题;最后,结合仿真实验对所提算法的有效性进行验证。结果表明:相较于传统虚拟弹簧模型和改进虚拟弹簧模型,本文提出的无人机路径算法在狭窄通道环境下进行无人机路径规划所形成的路径更加平滑,在目标不可达情况下能够使无人机顺利到达目标点,能够在相对复杂的环境中对无人机路径进行规划。 展开更多
关键词 路径规划 无人机 虚拟弹簧模型 边界力 目标不可达性 狭窄通道
在线阅读 下载PDF
虚拟装配实训具身交互技术应用研究
16
作者 颜羽鹏 姜可 +3 位作者 石星辰 张靖宇 明世杰 何自强 《包装工程》 北大核心 2025年第18期84-95,共12页
目的为应对未来装配训练人机交互中的诸多挑战,梳理和分析了虚拟装配实训具身交互技术的研究现状并提出了研究思路,为人机交互理论和实践的发展提供支撑。方法分析虚拟装配实训系统现状及人机交互技术需求,结合具身交互技术特性,对系统... 目的为应对未来装配训练人机交互中的诸多挑战,梳理和分析了虚拟装配实训具身交互技术的研究现状并提出了研究思路,为人机交互理论和实践的发展提供支撑。方法分析虚拟装配实训系统现状及人机交互技术需求,结合具身交互技术特性,对系统的实施路径与关键技术进行归纳与总结。结果虚拟装配实训中多通道交互反馈融合是当前学界所面临的难题。具身交互技术促进了视听触多感官协同,为学员带来了更为高效和生动的认知体验。结论针对具身交互技术的应用研究,以多通道交互指令整合、交互反馈调控为核心目标。通过多通道交互实操、交互反馈融合及反馈信息调节,提升学员的认知效率,对促进虚拟装配实训及具身交互技术的未来发展具有至关重要的作用。 展开更多
关键词 虚拟装配 具身交互 多通道交互反馈融合 反馈调节
在线阅读 下载PDF
面向二维Mesh片上网络的路径多样性容错路由算法
17
作者 韩承浩 陈乃金 《长春理工大学学报(自然科学版)》 2025年第5期75-86,共12页
针对多路由器故障划分为单个矩形故障块后在绕行容错过程中引发的故障块周边路由器和链路负载不均问题,提出一种面向2D Mesh片上网络、适用于单个矩形故障块的无虚通道路径多样性容错路由算法。该算法基于内建自测试获取故障信息并广播... 针对多路由器故障划分为单个矩形故障块后在绕行容错过程中引发的故障块周边路由器和链路负载不均问题,提出一种面向2D Mesh片上网络、适用于单个矩形故障块的无虚通道路径多样性容错路由算法。该算法基于内建自测试获取故障信息并广播至全部路由器;在路由决策过程中,根据每个数据包的源-目的节点坐标和关键节点坐标,分为不同的情况来规定对应的容错路由策略,从而形成多样性的数据传输路径,使得流量分散,既保证了避开故障块,又缓解了负载不均。实验结果表明,在8×8 2D Mesh单矩形故障块条件下,所提出的算法相较于FTRA,饱和注入率平均提升54.9%,并且该算法具有无死锁的特性。 展开更多
关键词 路径多样性 片上网络 容错路由 无虚通道
在线阅读 下载PDF
2D Mesh的多故障容错路由算法
18
作者 胡宇杨 代广珍 陈乃金 《天津理工大学学报》 2025年第1期70-76,共7页
容错路由算法是确保片上网络(network on chip, NoC)可靠性的主要方法,然而多故障点的绕行容错往往会导致网络负载不均衡及网络时延增大,为了解决这个问题提出了一种多故障点的无虚通道绕行容错路由算法。算法依赖于内建自测试(built-in... 容错路由算法是确保片上网络(network on chip, NoC)可靠性的主要方法,然而多故障点的绕行容错往往会导致网络负载不均衡及网络时延增大,为了解决这个问题提出了一种多故障点的无虚通道绕行容错路由算法。算法依赖于内建自测试(built-in self-test, BIST)技术获取故障区域的位置信息,继而传输到部分节点的故障存储器中。通过数据包在X维度和Y维度遇到故障区域的情况分别采用了不同的绕行策略,且无死锁特性。在8×8的2D Mesh中,相比于参考的算法,在故障区域大小横向扩展为2×2,2×3,2×4的情况下,饱和注入率分别提高了18.75%,30.23%,12.85%,并且均衡了故障区域周围的网络负载。通过周期精确的仿真模拟器实验表明,随着故障区域的横纵扩展,所提算法有效地减少了网络时延,提高了饱和注入率。 展开更多
关键词 片上网络 路由算法 无虚通道 容错 饱和注入率
在线阅读 下载PDF
异构分布式存储池与本地API架构的设计
19
作者 陈云松 张中 +2 位作者 黄颖 罗敏 雷中科 《计算机应用》 北大核心 2025年第S2期195-199,共5页
随着互联网信息的爆炸式增长,传统的数据存储方式已经不能满足互联网设备的快速读写功能。为了提升存储设备的性能,提出一种异构分布式的存储池设计。首先,通过虚拟存储池的设计和磁盘阵列的扩充,增加数据的处理通道;其次,利用异构分布... 随着互联网信息的爆炸式增长,传统的数据存储方式已经不能满足互联网设备的快速读写功能。为了提升存储设备的性能,提出一种异构分布式的存储池设计。首先,通过虚拟存储池的设计和磁盘阵列的扩充,增加数据的处理通道;其次,利用异构分布式存储多通道服务器提升信息数据的处理效率;最后,通过设计基于中层缓冲区的本地应用程序编程接口(API)处理层实现常用信息数据的快速调用,从而缩短数据传输路径。实验结果表明,所提异构分布式存储池在进行数据读写测试时的网络传输带宽更加稳定,网络集合带宽均值为5788 KB/s,而读取过程的网络集合带宽均值为7089 KB/s。与直接依附存储(DAS)、网络附加存储(NAS)和分布式文件系统(DFS)这3种主流技术相比:所提存储池在平均读取带宽上提升了21.79%~29.52%;在预测存储时间方面,所提存储池的最大存储池网络延迟仅增加了11.66%。 展开更多
关键词 数据存储 虚拟存储池 磁盘阵列 异构分布 多通道服务器
在线阅读 下载PDF
基于冲突的缓存侧信道攻击与驱逐集综述
20
作者 姚梓豪 马自强 +1 位作者 李扬 魏良根 《计算机应用》 北大核心 2025年第7期2070-2078,共9页
缓存侧信道攻击是一种利用计算机缓存共享特性的侧信道攻击手段,对跨处理器、跨虚拟机的目标密码系统构成严重威胁。其中基于冲突的缓存侧信道攻击突破了使用特权指令的限制,能构造一组与目标地址映射到同一缓存集的虚拟地址,即驱逐集,... 缓存侧信道攻击是一种利用计算机缓存共享特性的侧信道攻击手段,对跨处理器、跨虚拟机的目标密码系统构成严重威胁。其中基于冲突的缓存侧信道攻击突破了使用特权指令的限制,能构造一组与目标地址映射到同一缓存集的虚拟地址,即驱逐集,从而造成缓存冲突,进而最终获取目标的隐私数据。构造驱逐集已成为基于冲突的缓存侧信道攻击和推测执行攻击的关键技术之一。因此,对基于冲突的缓存侧信道攻击与驱逐集的研究进行综述。首先,剖析了基于冲突的缓存侧信道攻击的基本原理;其次,分析了驱逐集构造算法的基本原理、发展现状,根据候选地址的操作策略和驱逐集的构造策略不同,将算法分为冲突移除法和冲突渐增法两类;再次,对驱逐集构造算法的影响因素进行了归纳;最后,讨论了基于冲突的缓存侧信道攻击的现状及未来的研究方向。 展开更多
关键词 系统安全 缓存侧信道攻击 驱逐集 虚拟地址 缓存替换策略
在线阅读 下载PDF
上一页 1 2 26 下一页 到第
使用帮助 返回顶部