oalib

OALib Journal期刊

ISSN: 2333-9721

费用:99美元

投稿

时间不限

2018 ( 3 )

2017 ( 108 )

2016 ( 132 )

2015 ( 1407 )

自定义范围…

匹配条件: “HU Ming-Zeng” ,找到相关结果约58492条。
列表显示的所有文章,均可免费获取
第1页/共58492条
每页显示
On the Construction of Tight Double Loop Networks
最优双环网的构造

LIU Huan-ping,},YANG Yi-xian,Hu Ming-zeng,
刘焕平

系统工程理论与实践 , 2001,
Abstract: A new fast algorithm for the design of the a optimal double loop networks(DLN) is presented, which solves a problem listed in reference for the directed case.
Research and Improvement on the Data Distribution Algorithm of pC++ Language
pC++语言中数据划分算法的研究与改进

SHI Wei,FANG Bin-xing,HU Ming-zeng,
石威
,方滨兴,胡铭曾

软件学报 , 1999,
Abstract: 大规模并行计算是当前该领域研究的一大热点.由于大多数应用问题是数据并行问题,所以人们更多地采用数据并行计算方法来解决实际问题.在数据并行计算中,影响计算速度的一个重要因素是数据的划分状况.该文针对一种较为流行的面向对象数据并行语言——pC++的数据划分算法进行了分析,并指出了其不足之处,同时提出了一种改进的数据划分算法.实验表明,此算法与原有算法相比具有明显的优越性.
Techniques for Determining the Geographic Location of IP Addresses in ISP Topology Measurement
Yu Jiang,Bin-Xing Fang,Ming-Zeng Hu,Xiang Cui,
Yu Jiang
,Bin-Xing Fang,Ming-ZengHu,and Xiang Cui

计算机科学技术学报 , 2005,
Abstract: A brief survey on the state-of-the-art research of determining geographic location of IP addresses is presented. The problem of determining the geographic location of routers in Internet Service Provider (ISP) topology measurement is discussed when there is inadequate information such as domain names that could be used. Nine empirical inference rules are provided, and they are respectively (1) rule of mutual inference, (2) rule of locality, (3) rule of ping-pong assignment, (4) rule of bounding from both sides, (5) rule of preferential exit deny, (6) rule of unreachable/timeout, (7) rule of relay hop assignment, (8) rule of following majority, and (9) rule of validity checking based on interface-finding. In totally 2,563 discovered router interfaces of a national ISP topology, only 6.4% of them can be located by their corresponding domain names. In contrast, after exercising these nine empirical inference rules, 38% of them have been located. Two methods have mainly been employed to evaluate the effectiveness of these inference rules. One is to compare the measured topology graph with the graph published by the corresponding ISP. The other is to contact the administrator of the corresponding ISP for the verification of IP address locations of some key routers. The conformity between the locations inferred by the rules and those determined by domain names as well as those determined by whois information is also examined. Experimental results show that these empirical inference rules play an important role in determining the geographic location of routers in ISP topology measurement. Supported by the National Natural Science Foundation of China under Grant Nos. 60203021 and 60403033. Yu Jiang received the B.S. degree in computer software from the Heilongjiang University, Harbin, China, in 1990 and the M.S. degree in computer software and theory from the Harbin Institute of Technology (HIT), Harbin, China, in 1999. From August 1990 to August 1999, he worked on computer applications for the Statistics Bureau of Heilongjiang Provincial Government. At present, he is with the professional title of senior electronic engineer, and he is currently working toward the Ph.D. degree at the HIT. His current research interests are in the areas of Internet measurement and distributed network computing. Bin-Xing Fang received the B.S. degree in computer applications from the HIT, Harbin, China, in 1981 and the M.S. degree in computer architecture from Tsinghua University, Beijing, China, in 1984 and the Ph.D. degree in computer architecture from the HIT, Harbin, China, in 1989. He conducted post-doctoral research work at the National University of Defense Technology, Changsha, China. He is a part time professor in the School of Computer Science and Technology at the HIT, Harbin, China, and the head of the National Computer Network Emergency Response Technical Team/Coordination Center, Beijing, China. His research interests are in the areas of computer network and
The Tight Optimal Infinite Faimlies of Undirected Double Loop Networks
两类新的无向双环网络紧优无限族

LIU Huan-ping {,},YANG Yi-xian,HU Ming-zeng,
刘焕平
,杨义先,胡铭曾

系统工程理论与实践 , 2002,
Abstract: New upper bounds of the diameters of undirected double loop networks(UDLN) are found. Two new classes of infinite families of tight UDLN are constructed by the new upper bounds. All of the known infinite families of the tight UDLN in are sub-families of ours.
A Multi-radio Based on QoS Guarantee Mechanism for Wireless Ad hoc Networks
一种基于多无线收发器的无线自组网服务质量保障机制

Cao Zhi-yan,Ji Zhen-zhou,Hu Ming-zeng,
曹志研
,季振洲,胡铭曾

电子与信息学报 , 2009,
Abstract: In order to improve the capacity of wireless Ad hoc networks and satisfy the QoS requirements of multimedia sessions, multi-radio technique is introduced and stateless QoS model in single-interface single-channel—SWAN is extended to stateless QoS model in multi-interface multi-channel—MMSWAN. At the same time, a multi-interface multi-channel QoS routing protocol—MMQAODV is proposed, which is combined with MMSWAN to implement a cross-layer QoS guarantee mechanism. Simulation shows that the mechanism improves QoS of multimedia sessions and performances of best-effort sessions. In comparison with SWAN, end-to-end delay is reduced to its 2%~27% and delivered best-effort data are increased to 1.29~3.55 times of it.
A Distributed Intrusion Detection Model Based on Mobile Agent
基于移动Agent的分布式入侵检测模型*

SHI Zhi-cai,JI Zhen-zhou,HU Ming-Zeng,
史志才
,季振洲,胡铭曾

计算机应用研究 , 2005,
Abstract: The technical problems and obstacles of distributed intrusion detection are analyzed. A novel hierarchy model of multi-level detection intrusion is developed to enhance the security and collaborative detection capability of the model. Com-munication load is reduced effectively and the real-time performance of intrusion detection is enhanced. And it can evolve and adjust itself dynamically to adapt to the environmental change. The model is robust and scalable.
Measurement Method of Gnutella-Like Peer-to-Peer Network
类Gnutella的对等网络的测量方法研究*

LIU Gang,FANG Bin-xing,HU Ming-zeng,ZHANG Hong-li,
刘刚
,方滨兴,胡铭曾,张宏莉

计算机应用研究 , 2006,
Abstract: The paper designs and implements a new crawler to extract the topology of the Gnutella network, and empirically deduces the shutter speed for an accurate topological snapshot.
Study on Construction and Application of Vulnerability Database
弱点数据库的建构及其应用研究*

OU Xin-feng,HU Ming-zeng,ZHANG Tao,ZHANG Yong-zheng,
欧鑫凤
,胡铭曾,张涛,张永铮

计算机应用研究 , 2007,
Abstract: Authors designed and established a multi-attribute quantitative vulnerability database,by introducing attributes like privilege sets,confidentiality,integrality,availability.The vulnerability information was also analyzed further.Practice has proved that it is a more comprehensive and powerful way for security assessment system by using this vulnerability information support.
An Example of Analyzing the Characteristics of a Large Scale ISP Topology Measured from Multiple Vantage Points
大型ISP网络拓扑多点测量及其特征分析实例

JIANG Yu,FANG Bin-Xing,HU Ming-Zeng,HE Ren-Qing,
姜誉
,方滨兴,胡铭曾,何仁清

软件学报 , 2005,
Abstract: A detailed understanding of the structural properties of Internet topology will benefit the further design and development of the Internet. It seems infeasible to study the whole Internet at router level due to its extremely large size and the difficulty in obtaining a whole topology at this level. Studying each national or continental Internet service provider (ISP) topology individually becomes an alternative method for this goal. In this paper, the measured China Education and Research Network topology, a nationwide ISP topology, is basically taken as an example. The results of mapping the topology from multiple vantage points are briefly presented. The properties of the degree distribution, large eigenvalues, and the spectral density of the measured topology graphs are analyzed. The characteristics of the signless Laplacian spectra (SLS), the normalized Laplacian spectra (NLS), and the clustering coefficients of the measured graphs are also presented. The results suggest that some power laws indeed hold in some large-scale ISP topologies; in contrast to the case of autonomous system level topologies, the power law fit is not the best choice for some ISP topologies in terms of the complementary cumulative distribution function of the degree; some real ISP topologies are a kind of scale-free graphs which are not consistent with the Barabási-Albert (BA) growth model; router level topologies are distinguishable in terms of the SLS or the NLS; router level Internet topology may have developed over time following a different set of growth processes from those of the BA model.
An Effective Dynamic Load Balancing Method
一个有效的动态负载平衡方法

LIU Zhen-ying,FANG Bin-xing,HU Ming-zeng,ZHANG Yi,
刘振英
,方滨兴,胡铭曾,张毅

软件学报 , 2001,
Abstract: 动态负载平衡问题是影响工作站网络并行计算性能的重要因素.首先分析出在负载平衡中产生额外开销的根本原因是负载的移动,进而定性地给出了每次移动负载的粒度公式.引入益处估计的方法,仅在有益的情况下进行负载平衡.另外还提出了一个动态负载平衡算法.最后,通过实验,将该算法的运行结果与其他人的负载平衡结果以及不作负载平衡的情况进行了对比.此负载平衡方法在工作站为空载以及不同的负载和应用问题的数据规模的情况下,都优于Siegell等人提出的方法.
第1页/共58492条
每页显示


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.