期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
An Application of Searching-in-Tables Algorithm into Fuzzy Backing-up Truck Systems 被引量:1
1
作者 FAN Jiu lun 1, XIE Xie 2 (1 Department of Information and Control, Xi’an Institute of Posts and Telecommunications, Xi’an 710061, P.R. China 2 Department of Computer Science, Xi’an Institute of Posts and Telecommunications, Xi’an 710061, P.R. C 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2002年第1期66-71,共6页
In an unbound area, many methods have been proposed to design fuzzy truck backer control system. For a bound area, we consider designing fuzzy truck backer control systems using the searching in tables algorithm in ... In an unbound area, many methods have been proposed to design fuzzy truck backer control system. For a bound area, we consider designing fuzzy truck backer control systems using the searching in tables algorithm in this paper. New control rule tables are established, and experiment results show that the new control rule tables are better than the old ones. 展开更多
关键词 backing up truck searching in tables algorithm fuzzy if then rules
原文传递
A Fast and Memory-Efficient Approach to NDN Name Lookup 被引量:4
2
作者 Dacheng He Dafang Zhang +2 位作者 Ke Xu Kun Huang Yanbiao Li 《China Communications》 SCIE CSCD 2017年第10期61-69,共9页
For name-based routing/switching in NDN, the key challenges are to manage large-scale forwarding Tables, to lookup long names of variable lengths, and to deal with frequent updates. Hashing associated with proper leng... For name-based routing/switching in NDN, the key challenges are to manage large-scale forwarding Tables, to lookup long names of variable lengths, and to deal with frequent updates. Hashing associated with proper length-detecting is a straightforward yet efficient solution. Binary search strategy can reduce the number of required hash detecting in the worst case. However, to assure the searching path correct in such a schema, either backtrack searching or redundantly storing some prefixes is required, leading to performance or memory issues as a result. In this paper, we make a deep study on the binary search, and propose a novel mechanism to ensure correct searching path without neither additional backtrack costs nor redundant memory consumptions. Along any binary search path, a bloom filter is employed at each branching point to verify whether a said prefix is present, instead of storing that prefix here. By this means, we can gain significantly optimization on memory efficiency, at the cost of bloom checking before each detecting. Our evaluation experiments on both real-world and randomly synthesized data sets demonstrate our superiorities clearly 展开更多
关键词 named data networking binary search of hash table bloom filter
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部