期刊文献+
共找到28,347篇文章
< 1 2 250 >
每页显示 20 50 100
A Trajectory-Oriented Carriageway-Based Road Network Data Model, Part 1: Background 被引量:10
1
作者 LI Xiang LIN Hui 《Geo-Spatial Information Science》 2006年第1期65-70,共6页
This is the first of a three-part series of pape rs which introduces a general background of building trajectory-oriented road net work data models, including motivation, related works, and basic concepts. The p urpos... This is the first of a three-part series of pape rs which introduces a general background of building trajectory-oriented road net work data models, including motivation, related works, and basic concepts. The p urpose of the series is to develop a trajectory-oriented road network data mode l, namely carriageway-based road network data model (CRNM). Part 1 deals with t he modeling background. Part 2 proposes the principle and architecture of the CR NM. Part 3 investigates the implementation of the CRNM in a case study. In the p resent paper, the challenges of managing trajectory data are discussed. Then, de veloping trajectory-oriented road network data models is proposed as a solution and existing road network data models are reviewed. Basic representation approa ches of a road network are introduced as well as its constitution. 展开更多
关键词 TRAJECTORY road network data model CARRIAGEWAY GIS GIS-T
在线阅读 下载PDF
A Trajectory-Oriented, Carriageway-Based Road Network Data Model,Part 2:Methodology 被引量:10
2
作者 LI Xiang LIN Hui 《Geo-Spatial Information Science》 2006年第2期112-117,150,共7页
This is the second of a three-part series of papers which presents the principle and architecture of the CRNM, a trajectory-oriented, carriageway-based road network data model. The first part of the series has introdu... This is the second of a three-part series of papers which presents the principle and architecture of the CRNM, a trajectory-oriented, carriageway-based road network data model. The first part of the series has introduced a general background of building trajectory-oriented road network data models, including motivation, related works, and basic concepts. Based on it, this paper describs the CRNM in detail. At first, the notion of basic roadway entity is proposed and discussed. Secondly, carriageway is selected as the basic roadway entity after compared with other kinds of roadway, and approaches to representing other roadways with carriageways are introduced. At last, an overall architecture of the CRNM is proposed. 展开更多
关键词 TRAJECTORY road network data model CARRIAGEWAY GIS GIS-T
在线阅读 下载PDF
A Trajectory-Oriented Carriageway-Based Road Network Data Model, Part 3: Implementation 被引量:6
3
作者 LI Xiang LIN Hui 《Geo-Spatial Information Science》 2006年第3期201-205,共5页
This is the final of a three-part series of papers which mainly discusses the implementation issues of the CRNM. The first two papers in the series have introduced the modeling background and methodology, respectively... This is the final of a three-part series of papers which mainly discusses the implementation issues of the CRNM. The first two papers in the series have introduced the modeling background and methodology, respectively. An overall architecture of the CRNM has been proposed in the last paper. On the basis of the above discusses, a linear reference method (LRM) for providing spatial references for location points of a trajectory is developed. A case study is introduced to illustrate the application of the CRNM for modeling a road network in the real world is given. A comprehensive conclusion is given for the series of papers. 展开更多
关键词 TRAJECTORY road network data model CARRIAGEWAY GIS GIS-T
在线阅读 下载PDF
On Measuring the Privacy of Anonymized Data in Multiparty Network Data Sharing 被引量:1
4
作者 陈晓云 苏玉洁 +2 位作者 唐晓晟 黄小红 马严 《China Communications》 SCIE CSCD 2013年第5期120-127,共8页
This paper aims to find a practical way of quantitatively representing the privacy of network data. A method of quantifying the privacy of network data anonymization based on similarity distance and entropy in the sce... This paper aims to find a practical way of quantitatively representing the privacy of network data. A method of quantifying the privacy of network data anonymization based on similarity distance and entropy in the scenario involving multiparty network data sharing with Trusted Third Party (TTP) is proposed. Simulations are then conducted using network data from different sources, and show that the measurement indicators defined in this paper can adequately quantify the privacy of the network. In particular, it can indicate the effect of the auxiliary information of the adversary on privacy. 展开更多
关键词 privacy network data anonymization multiparty network data sharing
在线阅读 下载PDF
A Dynamic Social Network Data Publishing Algorithm Based on Differential Privacy 被引量:2
5
作者 Zhenpeng Liu Yawei Dong +1 位作者 Xuan Zhao Bin Zhang 《Journal of Information Security》 2017年第4期328-338,共11页
Social network contains the interaction between social members, which constitutes the structure and attribute of social network. The interactive relationship of social network contains a lot of personal privacy inform... Social network contains the interaction between social members, which constitutes the structure and attribute of social network. The interactive relationship of social network contains a lot of personal privacy information. The direct release of social network data will cause the disclosure of privacy information. Aiming at the dynamic characteristics of social network data release, a new dynamic social network data publishing method based on differential privacy was proposed. This method was consistent with differential privacy. It is named DDPA (Dynamic Differential Privacy Algorithm). DDPA algorithm is an improvement of privacy protection algorithm in static social network data publishing. DDPA adds noise which follows Laplace to network edge weights. DDPA identifies the edge weight information that changes as the number of iterations increases, adding the privacy protection budget. Through experiments on real data sets, the results show that the DDPA algorithm satisfies the user’s privacy requirement in social network. DDPA reduces the execution time brought by iterations and reduces the information loss rate of graph structure. 展开更多
关键词 DYNAMIC SOCIAL network data PUBLISHING DIFFERENTIAL PRIVACY
在线阅读 下载PDF
Fusion analysis of MH-Ni batteries characteristics by neural network data fusion method
6
作者 游林儒 张晋格 王炎 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2001年第1期69-73,共5页
Presents the fusion analysis of the charging and discharging characteristics of MH Ni batteries in wide applications by neural network data fusion method to generate a specific vector and the use of this specific vect... Presents the fusion analysis of the charging and discharging characteristics of MH Ni batteries in wide applications by neural network data fusion method to generate a specific vector and the use of this specific vector for selection of MH Ni batteries, and the comparison of two results of selection. 展开更多
关键词 BATTERY neural network data fusion
在线阅读 下载PDF
Attacks and Countermeasures in Social Network Data Publishing
7
作者 YANG Mengmeng ZHU Tianqing +1 位作者 ZHOU Wanlei XIANG Yang 《ZTE Communications》 2016年第B06期2-9,共8页
With the increasing prevalence of social networks, more and more social network data are published for many applications, such as social network analysis and data mining. However, this brings privacy problems. For exa... With the increasing prevalence of social networks, more and more social network data are published for many applications, such as social network analysis and data mining. However, this brings privacy problems. For example, adversaries can get sensitive information of some individuals easily with little background knowledge. How to publish social network data for analysis purpose while preserving the privacy of individuals has raised many concerns. Many algorithms have been proposed to address this issue. In this paper, we discuss this privacy problem from two aspects: attack models and countermeasures. We analyse privacy conceres, model the background knowledge that adversary may utilize and review the recently developed attack models. We then survey the state-of-the-art privacy preserving methods in two categories: anonymization methods and differential privacy methods. We also provide research directions in this area. 展开更多
关键词 social network data publishing attack model privacy preserving
在线阅读 下载PDF
A Hierarchical-Based Sequential Caching Scheme in Named Data Networking
8
作者 Zhang Junmin Jin Jihuan +3 位作者 Hou Rui Dong Mianxiong Kaoru Ota Zeng Deze 《China Communications》 2025年第5期48-60,共13页
Named data networking(NDNs)is an idealized deployment of information-centric networking(ICN)that has attracted attention from scientists and scholars worldwide.A distributed in-network caching scheme can efficiently r... Named data networking(NDNs)is an idealized deployment of information-centric networking(ICN)that has attracted attention from scientists and scholars worldwide.A distributed in-network caching scheme can efficiently realize load balancing.However,such a ubiquitous caching approach may cause problems including duplicate caching and low data diversity,thus reducing the caching efficiency of NDN routers.To mitigate these caching problems and improve the NDN caching efficiency,in this paper,a hierarchical-based sequential caching(HSC)scheme is proposed.In this scheme,the NDN routers in the data transmission path are divided into various levels and data with different request frequencies are cached in distinct router levels.The aim is to cache data with high request frequencies in the router that is closest to the content requester to increase the response probability of the nearby data,improve the data caching efficiency of named data networks,shorten the response time,and reduce cache redundancy.Simulation results show that this scheme can effectively improve the cache hit rate(CHR)and reduce the average request delay(ARD)and average route hop(ARH). 展开更多
关键词 hierarchical router named data networking sequential caching
在线阅读 下载PDF
Enhanced Multi-Object Dwarf Mongoose Algorithm for Optimization Stochastic Data Fusion Wireless Sensor Network Deployment
9
作者 Shumin Li Qifang Luo Yongquan Zhou 《Computer Modeling in Engineering & Sciences》 2025年第2期1955-1994,共40页
Wireless sensor network deployment optimization is a classic NP-hard problem and a popular topic in academic research.However,the current research on wireless sensor network deployment problems uses overly simplistic ... Wireless sensor network deployment optimization is a classic NP-hard problem and a popular topic in academic research.However,the current research on wireless sensor network deployment problems uses overly simplistic models,and there is a significant gap between the research results and actual wireless sensor networks.Some scholars have now modeled data fusion networks to make them more suitable for practical applications.This paper will explore the deployment problem of a stochastic data fusion wireless sensor network(SDFWSN),a model that reflects the randomness of environmental monitoring and uses data fusion techniques widely used in actual sensor networks for information collection.The deployment problem of SDFWSN is modeled as a multi-objective optimization problem.The network life cycle,spatiotemporal coverage,detection rate,and false alarm rate of SDFWSN are used as optimization objectives to optimize the deployment of network nodes.This paper proposes an enhanced multi-objective mongoose optimization algorithm(EMODMOA)to solve the deployment problem of SDFWSN.First,to overcome the shortcomings of the DMOA algorithm,such as its low convergence and tendency to get stuck in a local optimum,an encircling and hunting strategy is introduced into the original algorithm to propose the EDMOA algorithm.The EDMOA algorithm is designed as the EMODMOA algorithm by selecting reference points using the K-Nearest Neighbor(KNN)algorithm.To verify the effectiveness of the proposed algorithm,the EMODMOA algorithm was tested at CEC 2020 and achieved good results.In the SDFWSN deployment problem,the algorithm was compared with the Non-dominated Sorting Genetic Algorithm II(NSGAII),Multiple Objective Particle Swarm Optimization(MOPSO),Multi-Objective Evolutionary Algorithm based on Decomposition(MOEA/D),and Multi-Objective Grey Wolf Optimizer(MOGWO).By comparing and analyzing the performance evaluation metrics and optimization results of the objective functions of the multi-objective algorithms,the algorithm outperforms the other algorithms in the SDFWSN deployment results.To better demonstrate the superiority of the algorithm,simulations of diverse test cases were also performed,and good results were obtained. 展开更多
关键词 Stochastic data fusion wireless sensor networks network deployment spatiotemporal coverage dwarf mongoose optimization algorithm multi-objective optimization
在线阅读 下载PDF
A symmetric difference data enhancement physics-informed neural network for the solving of discrete nonlinear lattice equations
10
作者 Jian-Chen Zhou Xiao-Yong Wen Ming-Juan Guo 《Communications in Theoretical Physics》 2025年第6期21-29,共9页
In this paper,we propose a symmetric difference data enhancement physics-informed neural network(SDE-PINN)to study soliton solutions for discrete nonlinear lattice equations(NLEs).By considering known and unknown symm... In this paper,we propose a symmetric difference data enhancement physics-informed neural network(SDE-PINN)to study soliton solutions for discrete nonlinear lattice equations(NLEs).By considering known and unknown symmetric points,numerical simulations are conducted to one-soliton and two-soliton solutions of a discrete KdV equation,as well as a one-soliton solution of a discrete Toda lattice equation.Compared with the existing discrete deep learning approach,the numerical results reveal that within the specified spatiotemporal domain,the prediction accuracy by SDE-PINN is excellent regardless of the interior or extrapolation prediction,with a significant reduction in training time.The proposed data enhancement technique and symmetric structure development provides a new perspective for the deep learning approach to solve discrete NLEs.The newly proposed SDE-PINN can also be applied to solve continuous nonlinear equations and other discrete NLEs numerically. 展开更多
关键词 symmetric difference data enhancement physics-informed neural network data enhancement symmetric point soliton solutions discrete nonlinear lattice equations
原文传递
Dynamic Routing of Multiple QoS-Required Flows in Cloud-Edge Autonomous Multi-Domain Data Center Networks 被引量:1
11
作者 Shiyan Zhang Ruohan Xu +3 位作者 Zhangbo Xu Cenhua Yu Yuyang Jiang Yuting Zhao 《Computers, Materials & Continua》 SCIE EI 2024年第2期2287-2308,共22页
The 6th generation mobile networks(6G)network is a kind of multi-network interconnection and multi-scenario coexistence network,where multiple network domains break the original fixed boundaries to form connections an... The 6th generation mobile networks(6G)network is a kind of multi-network interconnection and multi-scenario coexistence network,where multiple network domains break the original fixed boundaries to form connections and convergence.In this paper,with the optimization objective of maximizing network utility while ensuring flows performance-centric weighted fairness,this paper designs a reinforcement learning-based cloud-edge autonomous multi-domain data center network architecture that achieves single-domain autonomy and multi-domain collaboration.Due to the conflict between the utility of different flows,the bandwidth fairness allocation problem for various types of flows is formulated by considering different defined reward functions.Regarding the tradeoff between fairness and utility,this paper deals with the corresponding reward functions for the cases where the flows undergo abrupt changes and smooth changes in the flows.In addition,to accommodate the Quality of Service(QoS)requirements for multiple types of flows,this paper proposes a multi-domain autonomous routing algorithm called LSTM+MADDPG.Introducing a Long Short-Term Memory(LSTM)layer in the actor and critic networks,more information about temporal continuity is added,further enhancing the adaptive ability changes in the dynamic network environment.The LSTM+MADDPG algorithm is compared with the latest reinforcement learning algorithm by conducting experiments on real network topology and traffic traces,and the experimental results show that LSTM+MADDPG improves the delay convergence speed by 14.6%and delays the start moment of packet loss by 18.2%compared with other algorithms. 展开更多
关键词 MULTI-DOMAIN data center networks AUTONOMOUS ROUTING
在线阅读 下载PDF
AMAD:Adaptive Mapping Approach for Datacenter Networks,an Energy-Friend Resource Allocation Framework via Repeated Leader Follower Game
12
作者 Ahmad Nahar Quttoum Muteb Alshammari 《Computers, Materials & Continua》 SCIE EI 2024年第9期4577-4601,共25页
Cloud Datacenter Network(CDN)providers usually have the option to scale their network structures to allow for far more resource capacities,though such scaling options may come with exponential costs that contradict th... Cloud Datacenter Network(CDN)providers usually have the option to scale their network structures to allow for far more resource capacities,though such scaling options may come with exponential costs that contradict their utility objectives.Yet,besides the cost of the physical assets and network resources,such scaling may also imposemore loads on the electricity power grids to feed the added nodes with the required energy to run and cool,which comes with extra costs too.Thus,those CDNproviders who utilize their resources better can certainly afford their services at lower price-units when compared to others who simply choose the scaling solutions.Resource utilization is a quite challenging process;indeed,clients of CDNs usually tend to exaggerate their true resource requirements when they lease their resources.Service providers are committed to their clients with Service Level Agreements(SLAs).Therefore,any amendment to the resource allocations needs to be approved by the clients first.In this work,we propose deploying a Stackelberg leadership framework to formulate a negotiation game between the cloud service providers and their client tenants.Through this,the providers seek to retrieve those leased unused resources from their clients.Cooperation is not expected from the clients,and they may ask high price units to return their extra resources to the provider’s premises.Hence,to motivate cooperation in such a non-cooperative game,as an extension to theVickery auctions,we developed an incentive-compatible pricingmodel for the returned resources.Moreover,we also proposed building a behavior belief function that shapes the way of negotiation and compensation for each client.Compared to other benchmark models,the assessment results showthat our proposed models provide for timely negotiation schemes,allowing for better resource utilization rates,higher utilities,and grid-friend CDNs. 展开更多
关键词 data center networks energy-aware resource management resource utilization game-theory mechanisms
在线阅读 下载PDF
A distributed authentication and authorization scheme for in-network big data sharing 被引量:3
13
作者 Ruidong Li Hitoshi Asaeda +1 位作者 Jie Li Xiaoming Fu 《Digital Communications and Networks》 SCIE 2017年第4期226-235,共10页
Big data has a strong demand for a network infrastructure with the capability to support data sharing and retrieval efficiently. Information-centric networking (ICN) is an emerging approach to satisfy this demand, w... Big data has a strong demand for a network infrastructure with the capability to support data sharing and retrieval efficiently. Information-centric networking (ICN) is an emerging approach to satisfy this demand, where big data is cached ubiquitously in the network and retrieved using data names. However, existing authentication and authorization schemes rely mostly on centralized servers to provide certification and mediation services for data retrieval. This causes considerable traffic overhead for the secure distributed sharing of data. To solve this problem, we employ identity-based cryptography (IBC) to propose a Distributed Authentication and Authorization Scheme (DAAS), where an identity-based signature (IBS) is used to achieve distributed verifications of the identities of publishers and users. Moreover, Ciphertext-Policy Attribnte-based encryption (CP-ABE) is used to enable the distributed and fine-grained authorization. DAAS consists of three phases: initialization, secure data publication, and secure data retrieval, which seamlessly integrate authentication and authorization with the in- terest/data communication paradigm in ICN. In particular, we propose trustworthy registration and Network Operator and Authority Manifest (NOAM) dissemination to provide initial secure registration and enable efficient authentication for global data retrieval. Meanwhile, Attribute Manifest (AM) distribution coupled with automatic attribute update is proposed to reduce the cost of attribute retrieval. We examine the performance of the proposed DAAS, which shows that it can achieve a lower bandwidth cost than existing schemes. 展开更多
关键词 Big data Security Authentication ACCESS control In-network data sharing Information-centric network
在线阅读 下载PDF
Monitoring travel patterns in German city regions with the help of mobile phone network data
14
作者 Stefan Fina Jigeeshu Joshi Dirk Wittowsky 《International Journal of Digital Earth》 SCIE 2021年第3期379-399,共21页
This paper discusses the possibility to use mobile phone network data to monitor spatial policies in land use and transport planning.Monitoring requires robust time series and reproducible concepts linking spatial pol... This paper discusses the possibility to use mobile phone network data to monitor spatial policies in land use and transport planning.Monitoring requires robust time series and reproducible concepts linking spatial policies to monitoring outcomes,a requirement differing from current literature where mobile phone data analysis is exemplified in selected areas with privileged data access.Concepts need to serve the evaluation of policy objectives,for example in regional or local area plans.In this study,we,therefore,extend the application of mobile phone network data to monitoring applications comparing urban settlement types and their characteristic mobility patterns.To accomplish this,we link mobile phone records with urban classifications and transport network data,using both visual and computational approaches to mine the data.The article presents comparisons of travel patterns for selected monocentric and polycentric city regions in Germany,testing hypotheses of transit-oriented regional development,as well as testing for congestion risks in the transport network.The results help us to gain a more detailed understanding of spatial and temporal patterns in mobility for different urban types and assess future potentials for monitoring spatial policies with mobile phone network data. 展开更多
关键词 Mobile phone network data big data urban mobility visual analytics congestion analysis spatial and temporal analysis GIS
原文传递
Evaluating the resource management and profitability efficiencies of US commercial banks from a dynamic network perspective
15
作者 Qian Long Kweh Wen-Min Lu +1 位作者 Kaoru Tone Hsian-Ming Liu 《Financial Innovation》 2024年第1期4081-4100,共20页
The central concept of strategic benchmarking is resource management efficiency,which ultimately results in profitability.However,little is known about performance measurement from resource-based perspectives.This stu... The central concept of strategic benchmarking is resource management efficiency,which ultimately results in profitability.However,little is known about performance measurement from resource-based perspectives.This study uses the data envelopment analysis(DEA)model with a dynamic network structure to measure the resource management and profitability efficiencies of 287 US commercial banks from 2010 to 2020.Furthermore,we provide frontier projections and incorporate five variables,namely capital adequacy,asset quality,management quality,earning ability,and liquidity(i.e.,the CAMEL ratings).The results revealed that the room for improvement in bank performance is 55.4%.In addition,we found that the CAMEL ratings of efficient banks are generally higher than those of inefficient banks,and management quality,earnings quality,and liquidity ratios positively contribute to bank performance.Moreover,big banks are generally more efficient than small banks.Overall,this study continues the current heated debate on performance measurement in the banking industry,with a particular focus on the DEA application to answer the fundamental question of why resource management efficiency reflects benchmark firms and provides insights into how efficient management of CAMEL ratings would help in improving their performance. 展开更多
关键词 Performance evaluation Dynamic network data envelopment analysis CAMEL ratings Resource management efficiency Profitability efficiency
在线阅读 下载PDF
Machine Learning for 5G and Beyond:From ModelBased to Data-Driven Mobile Wireless Networks 被引量:12
16
作者 Tianyu Wang Shaowei Wang Zhi-Hua Zhou 《China Communications》 SCIE CSCD 2019年第1期165-175,共11页
During the past few decades,mobile wireless communications have experienced four generations of technological revolution,namely from 1 G to 4 G,and the deployment of the latest 5 G networks is expected to take place i... During the past few decades,mobile wireless communications have experienced four generations of technological revolution,namely from 1 G to 4 G,and the deployment of the latest 5 G networks is expected to take place in 2019.One fundamental question is how we can push forward the development of mobile wireless communications while it has become an extremely complex and sophisticated system.We believe that the answer lies in the huge volumes of data produced by the network itself,and machine learning may become a key to exploit such information.In this paper,we elaborate why the conventional model-based paradigm,which has been widely proved useful in pre-5 G networks,can be less efficient or even less practical in the future 5 G and beyond mobile networks.Then,we explain how the data-driven paradigm,using state-of-the-art machine learning techniques,can become a promising solution.At last,we provide a typical use case of the data-driven paradigm,i.e.,proactive load balancing,in which online learning is utilized to adjust cell configurations in advance to avoid burst congestion caused by rapid traffic changes. 展开更多
关键词 mobile WIRELESS networks data-DRIVEN PARADIGM MACHINE learning
在线阅读 下载PDF
Data network traffic analysis and optimization strategy of real-time power grid dynamic monitoring system for wide-frequency measurements 被引量:4
17
作者 Jinsong Li Hao Liu +2 位作者 Wenzhuo Li Tianshu Bi Mingyang Zhao 《Global Energy Interconnection》 EI CAS CSCD 2022年第2期131-142,共12页
The application and development of a wide-area measurement system(WAMS)has enabled many applications and led to several requirements based on dynamic measurement data.Such data are transmitted as big data information ... The application and development of a wide-area measurement system(WAMS)has enabled many applications and led to several requirements based on dynamic measurement data.Such data are transmitted as big data information flow.To ensure effective transmission of wide-frequency electrical information by the communication protocol of a WAMS,this study performs real-time traffic monitoring and analysis of the data network of a power information system,and establishes corresponding network optimization strategies to solve existing transmission problems.This study utilizes the traffic analysis results obtained using the current real-time dynamic monitoring system to design an optimization strategy,covering the optimization in three progressive levels:the underlying communication protocol,source data,and transmission process.Optimization of the system structure and scheduling optimization of data information are validated to be feasible and practical via tests. 展开更多
关键词 Power system data network Wide-frequency information Real-time system Traffic analysis Optimization strategy
在线阅读 下载PDF
Accessing Multi-Source Geological Data through Network in MORPAS Software System 被引量:3
18
作者 MeiHongbo HuGuangdao +1 位作者 ChinJian~o LiZhenhua 《Journal of China University of Geosciences》 SCIE CSCD 2003年第3期265-268,共4页
MORPAS is a special GIS (geographic information system) software system, based on the MAPGIS platform whose aim is to prospect and evaluate mineral resources quantificationally by synthesizing geological, geophysical,... MORPAS is a special GIS (geographic information system) software system, based on the MAPGIS platform whose aim is to prospect and evaluate mineral resources quantificationally by synthesizing geological, geophysical, geochemical and remote sensing data. It overlays geological database management, geological background and geological abnormality analysis, image processing of remote sensing and comprehensive abnormality analysis, etc.. It puts forward an integrative solution for the application of GIS in basic-level units and the construction of information engineering in the geological field. As the popularization of computer networks and the request of data sharing, it is necessary to extend its functions in data management so that all its data files can be accessed in the network server. This paper utilizes some MAPGIS functions for the second development and ADO (access data object) technique to access multi-source geological data in SQL Server databases. Then remote visiting and congruous management will be realized in the MORPAS system. 展开更多
关键词 multi-source geological data SQL Server accessing data through network
在线阅读 下载PDF
An Efficient Priority-Driven Congestion Control Algorithm for Data Center Networks 被引量:3
19
作者 Jiahua Zhu Xianliang Jiang +4 位作者 Yan Yu Guang Jin Haiming Chen Xiaohui Li Long Qu 《China Communications》 SCIE CSCD 2020年第6期37-50,共14页
With the emerging diverse applications in data centers,the demands on quality of service in data centers also become diverse,such as high throughput of elephant flows and low latency of deadline-sensitive flows.Howeve... With the emerging diverse applications in data centers,the demands on quality of service in data centers also become diverse,such as high throughput of elephant flows and low latency of deadline-sensitive flows.However,traditional TCPs are ill-suited to such situations and always result in the inefficiency(e.g.missing the flow deadline,inevitable throughput collapse)of data transfers.This further degrades the user-perceived quality of service(QoS)in data centers.To reduce the flow completion time of mice and deadline-sensitive flows along with promoting the throughput of elephant flows,an efficient and deadline-aware priority-driven congestion control(PCC)protocol,which grants mice and deadline-sensitive flows the highest priority,is proposed in this paper.Specifically,PCC computes the priority of different flows according to the size of transmitted data,the remaining data volume,and the flows’deadline.Then PCC adjusts the congestion window according to the flow priority and the degree of network congestion.Furthermore,switches in data centers control the input/output of packets based on the flow priority and the queue length.Different from existing TCPs,to speed up the data transfers of mice and deadline-sensitive flows,PCC provides an effective method to compute and encode the flow priority explicitly.According to the flow priority,switches can manage packets efficiently and ensure the data transfers of high priority flows through a weighted priority scheduling with minor modification.The experimental results prove that PCC can improve the data transfer performance of mice and deadline-sensitive flows while guaranting the throughput of elephant flows. 展开更多
关键词 data center network low-latency PRIORITY switch scheduling transmission control protocol
在线阅读 下载PDF
Preventing“Bad”Content Dispersal in Named Data Networking 被引量:2
20
作者 Yi Wang Zhuyun Qi Bin Liu 《China Communications》 SCIE CSCD 2018年第6期109-119,共11页
Named Data Networking(NDN)improves the data delivery efficiency by caching contents in routers. To prevent corrupted and faked contents be spread in the network,NDN routers should verify the digital signature of each ... Named Data Networking(NDN)improves the data delivery efficiency by caching contents in routers. To prevent corrupted and faked contents be spread in the network,NDN routers should verify the digital signature of each published content. Since the verification scheme in NDN applies the asymmetric encryption algorithm to sign contents,the content verification overhead is too high to satisfy wire-speed packet forwarding. In this paper, we propose two schemes to improve the verification performance of NDN routers to prevent content poisoning. The first content verification scheme, called "user-assisted",leads to the best performance, but can be bypassed if the clients and the content producer collude. A second scheme, named ``RouterCooperation ‘', prevents the aforementioned collusion attack by making edge routers verify the contents independently without the assistance of users and the core routers no longer verify the contents. The Router-Cooperation verification scheme reduces the computing complexity of cryptographic operation by replacing the asymmetric encryption algorithm with symmetric encryption algorithm.The simulation results demonstrate that this Router-Cooperation scheme can speed up18.85 times of the original content verification scheme with merely extra 80 Bytes transmission overhead. 展开更多
关键词 named data networking ROUTER content verification encryption algorithm
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部