期刊文献+

基于拓扑势的网络拓扑建模方法 被引量:1

Network Topology Modeling Method Based on Topology Potential
下载PDF
导出
摘要 针对现有拓扑建模研究中层次型模型不满足幂率分布规律的问题,提出一种基于节点拓扑势与幂率特性的层次化网络拓扑建模方法,给出拓扑生成算法PPHM。通过计算拓扑势实现网络节点的分层,能准确发现网络中的重要连接。对平均最短路径长度等拓扑参数的比较结果证明了该方法的有效性。 In view of the question that the hierarchical mold does not satisfy the power law distribution rule in the existing topological modeling research, this paper proposes a hierarchical network topology model and a topology generating algorithm PPHM based on topology potential and power law. It realizes node stratifying by computing the topology potential, exactly discovers network important connection. Through comparing with the topological properties such as average minimum road length and so on, the validity of this modeling method is proved,
出处 《计算机工程》 CAS CSCD 北大核心 2010年第5期109-110,113,共3页 Computer Engineering
基金 2008年度广西研究生教育创新计划基金资助项目"计算机综合网络管理系统"(2008105950812M427)
关键词 拓扑势 影响因子 模型 幂率 层次 topology potential influence factor model power law hierarchical
  • 相关文献

参考文献11

二级参考文献65

  • 1张宏莉,方滨兴,何慧,张宇,毕慧.大规模网络拓扑测量中的关键技术[J].通信学报,2004,25(7):55-61. 被引量:8
  • 2姜誉,方滨兴,胡铭曾,何仁清.大型ISP网络拓扑多点测量及其特征分析实例[J].软件学报,2005,16(5):846-856. 被引量:38
  • 3[1]Newman M E J.The structure and function of complex networks.SIAMReview,2003 ;45(2):167-256
  • 4[2]Albert R,BarabsiA L.Topology of evolving networks:local events and universality.PhysRev Lett,2000 ;85 (24):5234-5237
  • 5[3]Sigman M,Cecchi G.Global organization of the Wordnet lexicon.Proc Nat Acad Sci USA,2002;99(3):1742-1747
  • 6[4]Eckmann J P,Moses E.Curvature of co_links uncovers hidden thematic layers in the World Wide Web.Proc Nat Acad Sci USA,2002 ;99 (9):5825-5829
  • 7[5]Ravasz E,Somera A L,Mongru D A,et al.Hierarchical organization of modularity in metabolic networks.Science,2002; 297 (5586):1551-1555
  • 8[6]Liljeros F,Edling C R,Amaral L A N,et al.The Web of human sexual contacts.Nature,2001 ;411 (6840):907-908
  • 9[7]Redner S.How popular is your paper? an empirical study of the citation distribution.Eur Phys J B,1998 ;4(2):131-134
  • 10[8]Doar M B.A better model for generating test networks.In:Proceedings of the GLOBECOM'96,IEEE,London,1996:86-93

共引文献86

同被引文献4

  • 1Ontko R,Reeder A.Modern Operating Systems Simulators[EB/OL].[2008-10-20].http://www.ontko.com/moss/.
  • 2Lee J S,Jung J R,Park J S,et al.Linux-based System Modeling for Cyber-attack Simulation[C] //Lecture Notes in Computer Science of Artificial Intelligence and Simulation.Heidellberg,Germany:Springer-Verlag,2005:585-596.
  • 3Lyon G.Remote OS Detection[EB/OL].[2008-09-19].http://nmap.org/book/osdetect.html.
  • 4Arkin O,Yarochkin F.Xprobe v2.0:A"Fuzzy"Approach to Remote Active Operating System Fingerprinting[EB/OL].[2008-04-03].http://www.sys-security.com/html/papers.html.

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部