期刊文献+
共找到20篇文章
< 1 >
每页显示 20 50 100
Joint Optimization of Energy Consumption and Network Latency in Blockchain-Enabled Fog Computing Networks
1
作者 Huang Xiaoge Yin Hongbo +3 位作者 Cao Bin Wang Yongsheng Chen Qianbin Zhang Jie 《China Communications》 SCIE CSCD 2024年第4期104-119,共16页
Fog computing is considered as a solution to accommodate the emergence of booming requirements from a large variety of resource-limited Internet of Things(IoT)devices.To ensure the security of private data,in this pap... Fog computing is considered as a solution to accommodate the emergence of booming requirements from a large variety of resource-limited Internet of Things(IoT)devices.To ensure the security of private data,in this paper,we introduce a blockchain-enabled three-layer device-fog-cloud heterogeneous network.A reputation model is proposed to update the credibility of the fog nodes(FN),which is used to select blockchain nodes(BN)from FNs to participate in the consensus process.According to the Rivest-Shamir-Adleman(RSA)encryption algorithm applied to the blockchain system,FNs could verify the identity of the node through its public key to avoid malicious attacks.Additionally,to reduce the computation complexity of the consensus algorithms and the network overhead,we propose a dynamic offloading and resource allocation(DORA)algorithm and a reputation-based democratic byzantine fault tolerant(R-DBFT)algorithm to optimize the offloading decisions and decrease the number of BNs in the consensus algorithm while ensuring the network security.Simulation results demonstrate that the proposed algorithm could efficiently reduce the network overhead,and obtain a considerable performance improvement compared to the related algorithms in the previous literature. 展开更多
关键词 blockchain energy consumption fog computing network Internet of Things LATENCY
下载PDF
Efficient Digital Twin Placement for Blockchain-Empowered Wireless Computing Power Network
2
作者 Wei Wu Liang Yu +2 位作者 Liping Yang Yadong Zhang Peng Wang 《Computers, Materials & Continua》 SCIE EI 2024年第7期587-603,共17页
As an open network architecture,Wireless Computing PowerNetworks(WCPN)pose newchallenges for achieving efficient and secure resource management in networks,because of issues such as insecure communication channels and... As an open network architecture,Wireless Computing PowerNetworks(WCPN)pose newchallenges for achieving efficient and secure resource management in networks,because of issues such as insecure communication channels and untrusted device terminals.Blockchain,as a shared,immutable distributed ledger,provides a secure resource management solution for WCPN.However,integrating blockchain into WCPN faces challenges like device heterogeneity,monitoring communication states,and dynamic network nature.Whereas Digital Twins(DT)can accurately maintain digital models of physical entities through real-time data updates and self-learning,enabling continuous optimization of WCPN,improving synchronization performance,ensuring real-time accuracy,and supporting smooth operation of WCPN services.In this paper,we propose a DT for blockchain-empowered WCPN architecture that guarantees real-time data transmission between physical entities and digital models.We adopt an enumeration-based optimal placement algorithm(EOPA)and an improved simulated annealing-based near-optimal placement algorithm(ISAPA)to achieve minimum average DT synchronization latency under the constraint of DT error.Numerical results show that the proposed solution in this paper outperforms benchmarks in terms of average synchronization latency. 展开更多
关键词 Wireless computing power network blockchain digital twin placement minimum synchronization latency
下载PDF
Federated learning based QoS-aware caching decisions in fog-enabled internet of things networks
3
作者 Xiaoge Huang Zhi Chen +1 位作者 Qianbin Chen Jie Zhang 《Digital Communications and Networks》 SCIE CSCD 2023年第2期580-589,共10页
Quality of Service(QoS)in the 6G application scenario is an important issue with the premise of the massive data transmission.Edge caching based on the fog computing network is considered as a potential solution to ef... Quality of Service(QoS)in the 6G application scenario is an important issue with the premise of the massive data transmission.Edge caching based on the fog computing network is considered as a potential solution to effectively reduce the content fetch delay for latency-sensitive services of Internet of Things(IoT)devices.Considering the time-varying scenario,the machine learning techniques could further reduce the content fetch delay by optimizing the caching decisions.In this paper,to minimize the content fetch delay and ensure the QoS of the network,a Device-to-Device(D2D)assisted fog computing network architecture is introduced,which supports federated learning and QoS-aware caching decisions based on time-varying user preferences.To release the network congestion and the risk of the user privacy leakage,federated learning,is enabled in the D2D-assisted fog computing network.Specifically,it has been observed that federated learning yields suboptimal results according to the Non-Independent Identical Distribution(Non-IID)of local users data.To address this issue,a distributed cluster-based user preference estimation algorithm is proposed to optimize the content caching placement,improve the cache hit rate,the content fetch delay and the convergence rate,which can effectively mitigate the impact of the Non-IID data set by clustering.The simulation results show that the proposed algorithm provides a considerable performance improvement with better learning results compared with the existing algorithms. 展开更多
关键词 Fog computing network IoT D2D communication Deep neural network Federated learning
下载PDF
Computing Power Network:The Architecture of Convergence of Computing and Networking towards 6G Requirement 被引量:26
4
作者 Xiongyan Tang Chang Cao +4 位作者 Youxiang Wang Shuai Zhang Ying Liu Mingxuan Li Tao He 《China Communications》 SCIE CSCD 2021年第2期175-185,共11页
In 6G era,service forms in which computing power acts as the core will be ubiquitous in the network.At the same time,the collaboration among edge computing,cloud computing and network is needed to support edge computi... In 6G era,service forms in which computing power acts as the core will be ubiquitous in the network.At the same time,the collaboration among edge computing,cloud computing and network is needed to support edge computing service with strong demand for computing power,so as to realize the optimization of resource utilization.Based on this,the article discusses the research background,key techniques and main application scenarios of computing power network.Through the demonstration,it can be concluded that the technical solution of computing power network can effectively meet the multi-level deployment and flexible scheduling needs of the future 6G business for computing,storage and network,and adapt to the integration needs of computing power and network in various scenarios,such as user oriented,government enterprise oriented,computing power open and so on. 展开更多
关键词 6G edge computing cloud computing convergence of cloud and network computing power network
下载PDF
Reputation-based joint optimization of user satisfaction and resource utilization in a computing force network
5
作者 Yuexia FU Jing WANG +2 位作者 Lu LU Qinqin TANG Sheng ZHANG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2024年第5期685-700,共16页
Under the development of computing and network convergence,considering the computing and network resources of multiple providers as a whole in a computing force network(CFN)has gradually become a new trend.However,sin... Under the development of computing and network convergence,considering the computing and network resources of multiple providers as a whole in a computing force network(CFN)has gradually become a new trend.However,since each computing and network resource provider(CNRP)considers only its own interest and competes with other CNRPs,introducing multiple CNRPs will result in a lack of trust and difficulty in unified scheduling.In addition,concurrent users have different requirements,so there is an urgent need to study how to optimally match users and CNRPs on a many-to-many basis,to improve user satisfaction and ensure the utilization of limited resources.In this paper,we adopt a reputation model based on the beta distribution function to measure the credibility of CNRPs and propose a performance-based reputation update model.Then,we formalize the problem into a constrained multi-objective optimization problem and find feasible solutions using a modified fast and elitist non-dominated sorting genetic algorithm(NSGA-II).We conduct extensive simulations to evaluate the proposed algorithm.Simulation results demonstrate that the proposed model and the problem formulation are valid,and the NSGA-II is effective and can find the Pareto set of CFN,which increases user satisfaction and resource utilization.Moreover,a set of solutions provided by the Pareto set give us more choices of the many-to-many matching of users and CNRPs according to the actual situation. 展开更多
关键词 computing force network Resource scheduling Performance-based reputation User satisfaction
原文传递
Combining graph neural network with deep reinforcement learning for resource allocation in computing force networks
6
作者 Xueying HAN Mingxi XIE +3 位作者 Ke YU Xiaohong HUANG Zongpeng DU Huijuan YAO 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2024年第5期701-712,共12页
Fueled by the explosive growth of ultra-low-latency and real-time applications with specific computing and network performance requirements,the computing force network(CFN)has become a hot research subject.The primary... Fueled by the explosive growth of ultra-low-latency and real-time applications with specific computing and network performance requirements,the computing force network(CFN)has become a hot research subject.The primary CFN challenge is to leverage network resources and computing resources.Although recent advances in deep reinforcement learning(DRL)have brought significant improvement in network optimization,these methods still suffer from topology changes and fail to generalize for those topologies not seen in training.This paper proposes a graph neural network(GNN)based DRL framework to accommodate network trafic and computing resources jointly and efficiently.By taking advantage of the generalization capability in GNN,the proposed method can operate over variable topologies and obtain higher performance than the other DRL methods. 展开更多
关键词 computing force network Routing optimization Deep learning Graph neural network Resource allocation
原文传递
Communication efficiency optimization of federated learning for computing and network convergence of 6G networks
7
作者 Yizhuo CAI Bo LEI +4 位作者 Qianying ZHAO Jing PENG Min WEI Yushun ZHANG Xing ZHANG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2024年第5期713-727,共15页
Federated learning effectively addresses issues such as data privacy by collaborating across participating devices to train global models.However,factors such as network topology and computing power of devices can aff... Federated learning effectively addresses issues such as data privacy by collaborating across participating devices to train global models.However,factors such as network topology and computing power of devices can affect its training or communication process in complex network environments.Computing and network convergence(CNC)of sixth-generation(6G)networks,a new network architecture and paradigm with computing-measurable,perceptible,distributable,dispatchable,and manageable capabilities,can effectively support federated learning training and improve its communication efficiency.By guiding the participating devices'training in federated learning based on business requirements,resource load,network conditions,and computing power of devices,CNC can reach this goal.In this paper,to improve the communication eficiency of federated learning in complex networks,we study the communication eficiency optimization methods of federated learning for CNC of 6G networks that give decisions on the training process for different network conditions and computing power of participating devices.The simulations address two architectures that exist for devices in federated learning and arrange devices to participate in training based on arithmetic power while achieving optimization of communication efficiency in the process of transferring model parameters.The results show that the methods we proposed can cope well with complex network situations,effectively balance the delay distribution of participating devices for local training,improve the communication eficiency during the transfer of model parameters,and improve the resource utilization in the network. 展开更多
关键词 computing and network convergence Communication efficiency Federated learning Two architectures
原文传递
Numerical simulation of neuronal spike patterns in a retinal network model 被引量:1
8
作者 Lei Wang Shenquan Liu Shanxing Ou 《Neural Regeneration Research》 SCIE CAS CSCD 2011年第16期1254-1260,共7页
This study utilized a neuronal compartment model and NEURON software to study the effects of external light stimulation on retinal photoreceptors and spike patterns of neurons in a retinal network Following light stim... This study utilized a neuronal compartment model and NEURON software to study the effects of external light stimulation on retinal photoreceptors and spike patterns of neurons in a retinal network Following light stimulation of different shapes and sizes, changes in the spike features of ganglion cells indicated that different shapes of light stimulation elicited different retinal responses. By manipulating the shape of light stimulation, we investigated the effects of the large number of electrical synapses existing between retinal neurons. Model simulation and analysis suggested that interplexiform cells play an important role in visual signal information processing in the retina, and the findings indicated that our constructed retinal network model was reliable and feasible. In addition, the simulation results demonstrated that ganglion cells exhibited a variety of spike patterns under different light stimulation sizes and different stimulation shapes, which reflect the functions of the retina in signal transmission and processing. 展开更多
关键词 computational network model RETINA light stimulation ganglion cell spike pattern
下载PDF
Prediction based dynamic resource allocation method for edge computing first networking
9
作者 Zhang Luying Liu Xiaokai +2 位作者 Li Zhao Xu Fangmin Zhao Chenglin 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2023年第3期78-87,共10页
Aiming at the factory with high-complex and multi-terminal in the industrial Internet of things(IIoT),a hierarchical edge networking collaboration(HENC)framework based on the cloud-edge collaboration and computing fir... Aiming at the factory with high-complex and multi-terminal in the industrial Internet of things(IIoT),a hierarchical edge networking collaboration(HENC)framework based on the cloud-edge collaboration and computing first networking(CFN)is proposed to improve the capability of task processing with fixed computing resources on the edge effectively.To optimize the delay and energy consumption in HENC,a multi-objective optimization(MOO)problem is formulated.Furthermore,to improve the efficiency and reliability of the system,a resource prediction model based on ridge regression(RR)is proposed to forecast the task size of the next time slot,and an emergency-aware(EA)computing resource allocation algorithm is proposed to reallocate tasks in edge CFN.Based on the simulation result,the EA algorithm is superior to the greedy resource allocation in time delay,energy consumption,quality of service(QoS)especially with limited computing resources. 展开更多
关键词 cloud-edge collaboration computing first networking(CFN) computing resource allocation multi-objective optimization(MOO)
原文传递
Credibility protection for resource sharing and collaborating in non-center network computing environments
10
作者 XU Xiao-long TU Qun +1 位作者 WANG Xin-heng WANG Ru-chuan 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2014年第3期46-55,共10页
Non-center network computing environments have some unique characteristics, such as instability, heterogeneity, autonomy, distribution and openness, which bring serious issues of security and reliability. This article... Non-center network computing environments have some unique characteristics, such as instability, heterogeneity, autonomy, distribution and openness, which bring serious issues of security and reliability. This article proposes a brand-new credibility protection mechanism for resource sharing and collaboration in non-center network computing environments. First, the three-dimensional hierarchical classified topology (3DHCT) is proposed, which provides a basic framework for realizations of the identity credibility, the behavior credibility and the capability credibility. Next, the agent technology is utilized to construct the credibility protection model. This article also proposes a new comprehensive credibility evaluation algorithm with simple, efficient, quantitative and able to meet the requirements of evaluating behavior credibility and the capability credibility evaluation as well. The Dempster-Shafer theory of evidence and the combination rule are used to achieve the evaluation of the capability credibility. The behavior credibility is evaluated with the current and historical performance of nodes for providers and consumers to realize more accurate prediction. Based on the non-center network computing simulation test platform, simulation is been conducted to test the performance and validity of the proposed algorithms. Experiment and analysis show that the proposed algorithms are suitable for large-scale, dynamic network computing environments, and able to maintain the credibility for networks without relying on central node, make a non-center network gradually evolve into an orderly, stable and reliable computing environment efficiently. 展开更多
关键词 non-center network computing AGENT CREDIBILITY EVIDENCE
原文传递
Process of Petri Nets Extension
11
作者 ZHOU Guofu HE Yanxiang DU Zhuomin 《Wuhan University Journal of Natural Sciences》 EI CAS 2006年第2期351-354,共4页
To describe the dynamic semantics for the network computing, the concept on process is presented Based on the semantic model with variable, resource and relation. Accordingly, the formal definition of process and the ... To describe the dynamic semantics for the network computing, the concept on process is presented Based on the semantic model with variable, resource and relation. Accordingly, the formal definition of process and the mapping rules from the specification of Petri nets extension to process are discussed in detail respectively. Based on the collective concepts of process, the specification of dynamic semantics also is constructed as a net system. Finally, to illustrate process intuitively, an example is specified completely. 展开更多
关键词 network computing computing model PROCESS Petri nets
下载PDF
Architecture and Key Technology of Distributed Intelligent Open Systems
12
作者 Xiaoyu Tong Yunyong Zhang Bingyi Fang 《ZTE Communications》 2011年第2期53-57,共5页
High-speed large-bandwidth networks and growth in rich internet applications has brought unprecedented pressure to bear on telecom operators. Consequently, operators need to play to the advantages of their networks, m... High-speed large-bandwidth networks and growth in rich internet applications has brought unprecedented pressure to bear on telecom operators. Consequently, operators need to play to the advantages of their networks, make good use of their large customer bases, and expand their business resources in service, platform, and interface. Network and customer resources should be integrated in order to create new business ecosystems. This paper describes new threats and challenges facing telecom operators and analyzes how leading operators are handling transformation in terms of operations and business model. A new concept called distributed intelligent open system (DIOS)—a public computing communication network—is proposed. The architecture and key technologies of DIOS is discussed in detail. 展开更多
关键词 DIOS public computing communication network (PCCN) cloud computing
下载PDF
Special Section of Tsinghua Science and Technology on Wireless Computing and Networking
13
《Tsinghua Science and Technology》 SCIE EI CAS 2013年第1期108-108,共1页
The publication of Tsinghua Science and Technology was started in 1996. Since then, it has been an international academic journal sponsored by Tsinghua University and published bimonthly. This journal aims at presenti... The publication of Tsinghua Science and Technology was started in 1996. Since then, it has been an international academic journal sponsored by Tsinghua University and published bimonthly. This journal aims at presenting the state-of-art scientific achievements in computer science, and other IT fields, and is currently indexed by Ei and other abstracting indices. From year 2013, the journal will be available for open access through IEEE Xplore Digital Library. This year's special section on Wireless Computing and Networking of Tsinghua Science and Technology is devoted to gather and present new research that address the challenges in the broad areas of Wireless Networks, Sensor Networks, Wireless Computing and Communication. While Wireless Networks have great potential to provide heterogeneous access and services for ubiquitous users, the demanding communication environment of wireless networks imposes challenges to many interesting research topics, such as channel estimation, communication protocol design, resource management, system design and so on. In Wireless Network research, it is unavoidable to wrestle unique problems such as non-uniform spectrum allocation, various radio resource management policies, economic concerns, the scarcity of radio resources, and user mobility. This Special Section therefore aims to publish high quality, original, unpublished research papers in the broad area of Wireless Computing and Networking, and thus presents a platform for scientists and scholars to share their observations and research results in the field. Specific topics for this special section include but are not limited to: 展开更多
关键词 Special Section of Tsinghua Science and Technology on Wireless computing and networking
原文传递
AN OBJECT-ORIENTED DISTRIBUTED MULTIMEDIA EDITOR
14
作者 Xu Dan(Computer Science Department Yunnan University Kunming,Yunnan Province,650091P.R.China) Pan Zhigeng Shi Jiaoying(State Key Lab.of CAD and CG Department of Applied Mathematics Zhejiang University Hangzhou Zhejiang Province 310027 P.R.China) 《Computer Aided Drafting,Design and Manufacturing》 1996年第2期35-42,共2页
Open Editor is an Object-Oriented multimedia editor,which runs in the network distributed environment.To add audio media into multimedia application,an audio server based on Client/Server paradigm is designed.In this ... Open Editor is an Object-Oriented multimedia editor,which runs in the network distributed environment.To add audio media into multimedia application,an audio server based on Client/Server paradigm is designed.In this paper,we first give an overview of Open Editor,then an in-depth discussion of the implementation techniques of audio functions is presented. 展开更多
关键词 ss:multimedia window system audio server networked computing OBJECT-ORIENTED
全文增补中
Optimum Tactics of Parallel Multi-Grid Algorithm with Virtual Boundary Forecast Method Running on a Local Network with the PVM Platform 被引量:2
15
作者 郭庆平 章社生 卫加宁 《Journal of Computer Science & Technology》 SCIE EI CSCD 2000年第4期355-359,共5页
In this paper, an optimum tactic of multi-grid parallel algorithmwith virtual boundary forecast method is disscussed, and a two-stage implementationis presented. The numerical results of solving a non-linear heat tran... In this paper, an optimum tactic of multi-grid parallel algorithmwith virtual boundary forecast method is disscussed, and a two-stage implementationis presented. The numerical results of solving a non-linear heat transfer equationshow that the optimum implementation is much better than the non-optimum one. 展开更多
关键词 ALGORITHM parallel multi-grid virtual boundary forecast (VBF) speedup network computing PVM
原文传递
Computational Approaches for Prioritizing Candidate Disease Genes Based on PPI Networks 被引量:4
16
作者 Wei Lan Jianxin Wang +2 位作者 Min Li Wei Peng Fangxiang Wu 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2015年第5期500-512,共13页
With the continuing development and improvement of genome-wide techniques, a great number of candidate genes are discovered. How to identify the most likely disease genes among a large number of candidates becomes a f... With the continuing development and improvement of genome-wide techniques, a great number of candidate genes are discovered. How to identify the most likely disease genes among a large number of candidates becomes a fundamental challenge in human health. A common view is that genes related to a specific or similar disease tend to reside in the same neighbourhood of biomolecular networks. Recently, based on such observations,many methods have been developed to tackle this challenge. In this review, we firstly introduce the concept of disease genes, their properties, and available data for identifying them. Then we review the recent computational approaches for prioritizing candidate disease genes based on Protein-Protein Interaction(PPI) networks and investigate their advantages and disadvantages. Furthermore, some pieces of existing software and network resources are summarized. Finally, we discuss key issues in prioritizing candidate disease genes and point out some future research directions. 展开更多
关键词 candidate disease-gene prioritization protein-protein interaction network human disease computational tools
原文传递
Collaborative Mobile Charging and Coverage 被引量:2
17
作者 吴杰 《Journal of Computer Science & Technology》 SCIE EI CSCD 2014年第4期550-561,共12页
Wireless energy charging using mobile vehicles has been a viable research topic recently in the area of wireless networks and mobile computing. This paper gives a short survey of recent research conducted in our resea... Wireless energy charging using mobile vehicles has been a viable research topic recently in the area of wireless networks and mobile computing. This paper gives a short survey of recent research conducted in our research group in the area of collaborative mobile charging. In collaborative mobile charging, multiple mobile chargers work together to accomplish a given set of ob jectives. These ob jectives include charging sensors at different frequencies with a minimum number of mobile chargers and reaching the farthest sensor for a given set of mobile chargers, subject to various constraints, including speed and energy limits of mobile chargers. Through the process of problem formulation, solution construction, and future work extension for problems related to collaborative mobile charging and coverage, we present three principles for good practice in conducting research. These principles can potentially be used for assisting graduate students in selecting a research problem for a term project, which can eventually be expanded to a thesis/dissertation topic. 展开更多
关键词 Internet of Things mobile charger optimal solution sensor wireless networks mobile computing
原文传递
Integration of IoT and DRAGON-lab in cloud environment 被引量:2
18
作者 FANTong-rang GAOFeng +1 位作者 ZHANGXuan ⅥANGXu 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2012年第2期87-91,共5页
Distributed research & academic gigabits open network lab (DRAGON-lab) is the only test-bed for research purpose related to next generation interact (NGI) which based on the confederation network using three laye... Distributed research & academic gigabits open network lab (DRAGON-lab) is the only test-bed for research purpose related to next generation interact (NGI) which based on the confederation network using three layers cloud structure. As an essential part of NGI, the research related to the Internet of things (loT) devices should be applied on the DRAGON-lab platform. This paper proposes an approach to converging the IoT devices to confederation network by integrating each layer of cloud structure between DRAGON-lab and IoT. This research activity extends the use of DRAGON-lab, makes the IoT and wireless sensor network (WSN) devices working well in the confederation network. It was also a foundational research for three layers cloud structure, which could be reused for other related research. Finally, it finishes the preparation work for IoT internet protocol version 6 (IPv6) devices research in DRAGON-Jab, which is essential for the NGI. 展开更多
关键词 DRAGON-lab loT cloud computing confederation network
原文传递
Sensorless Sensing with WiFi 被引量:11
19
作者 Zimu Zhou Chenshu Wu +1 位作者 Zheng Yang Yunhao Liu 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2015年第1期1-6,共6页
Can WiFi signals be used for sensing purpose? The growing PHY layer capabilities of WiFi has made it possible to reuse WiFi signals for both communication and sensing. Sensing via WiFi would enable remote sensing wit... Can WiFi signals be used for sensing purpose? The growing PHY layer capabilities of WiFi has made it possible to reuse WiFi signals for both communication and sensing. Sensing via WiFi would enable remote sensing without wearable sensors, simultaneous perception and data transmission without extra communication infrastructure, and contactless sensing in privacy-preserving mode. Due to the popularity of WiFi devices and the ubiquitous deployment of WiFi networks, WiFi-based sensing networks, if fully connected, would potentially rank as one of the world's largest wireless sensor networks. Yet the concept of wireless and sensorless sensing is not the simple combination of WiFi and radar. It seeks breakthroughs from dedicated radar systems, and aims to balance between low cost and high accuracy, to meet the rising demand for pervasive environment perception in everyday life. Despite increasing research interest, wireless sensing is still in its infancy. Through introductions on basic principles and working prototypes, we review the feasibilities and limitations of wireless, sensorless, and contactless sensing via WiFi. We envision this article as a brief primer on wireless sensing for interested readers to explore this open and largely unexplored field and create next-generation wireless and mobile computing applications. 展开更多
关键词 Channel State Information(CSI) sensorless sensing WiFi indoor localization device-free human detection activity recognition wireless networks ubiquitous computing
原文传递
Bayes-Based ARP Attack Detection Algorithm for Cloud Centers 被引量:1
20
作者 Huan Ma Hao Ding +3 位作者 Yang Yang Zhenqiang Mi James Yifei Yang Zenggang Xiong 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2016年第1期17-28,共12页
To address the issue of internal network security, Software-Defined Network(SDN) technology has been introduced to large-scale cloud centers because it not only improves network performance but also deals with netwo... To address the issue of internal network security, Software-Defined Network(SDN) technology has been introduced to large-scale cloud centers because it not only improves network performance but also deals with network attacks. To prevent man-in-the-middle and denial of service attacks caused by an address resolution protocol bug in an SDN-based cloud center, this study proposed a Bayes-based algorithm to calculate the probability of a host being an attacker and further presented a detection model based on the algorithm. Experiments were conducted to validate this method. 展开更多
关键词 cloud computing Bayes ARP attack detection software-defined network
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部