Controllers play a critical role in software-defined networking(SDN).However,existing singlecontroller SDN architectures are vulnerable to single-point failures,where a controller's capacity can be saturated by fl...
详细信息
Controllers play a critical role in software-defined networking(SDN).However,existing singlecontroller SDN architectures are vulnerable to single-point failures,where a controller's capacity can be saturated by flooded flow *** addition,due to the complicated interactions between applications and controllers,the flow setup latency is relatively *** address the above security and performance issues of current SDN controllers,we propose distributed rule store(DRS),a new multi-controller architecture for *** DRS,the controller caches the flow rules calculated by applications,and distributes these rules to multiple controller *** controller instance holds only a subset of all rules,and periodically checks the consistency of flow rules with each *** from switches are distributed among multiple controllers,in order to mitigate controller capacity saturation *** the same time,when rules at one controller are maliciously modified,they can be detected and recovered in *** implement DRS based on Floodlight and evaluate it with extensive *** results show that DRS can effectively maintain a consistently distributed rule store,and at the same time can achieve a shorter flow setup time and a higher processing throughput,compared with ONOS and Floodlight.
Hybrid mobile applications are coded in both standard web languages and native language. The including of web technologies results in that Hybrid applications introduce more security risks than the traditional web app...
详细信息
To address the problem of detecting the specific object of flame, this paper proposes quaternion discrete cosine transform based video flame detection algorithm in conjunction with the bottom-up visual attention mecha...
详细信息
With the increase in popularity of Portable Document Format(PDF) documents and increasing vulnerability of PDF users, effective detection of malicious PDF documents has become as a more and more significant issue. In ...
详细信息
With the increase in popularity of Portable Document Format(PDF) documents and increasing vulnerability of PDF users, effective detection of malicious PDF documents has become as a more and more significant issue. In this paper, we proposed a way to detect malicious PDF files by using semi-supervise learning method. Compare with previous studies, this method not only improve detection accuracy and generalization ability by combining with three different classifiers, but also effectively utilize the abundant unlabeled PDF files to retrain classifiers and update module by selecting the "useful" files from unlabeled test set.
Recent studies have applied different approaches for summarizing software artifacts, and yet very few efforts have been made in summarizing the source code fragments available on web. This paper investigates the feasi...
详细信息
Recent studies have applied different approaches for summarizing software artifacts, and yet very few efforts have been made in summarizing the source code fragments available on web. This paper investigates the feasibility of generating code fragment summaries by using supervised learning algorithms. We hire a crowd of ten individuals from the same work place to extract source code features on a cor- pus of 127 code fragments retrieved from Eclipse and Net- Beans Official frequently asked questions (FAQs). Human an- notators suggest summary lines. Our machine learning algo- rithms produce better results with the precision of 82% and perform statistically better than existing code fragment classi- fiers. Evaluation of algorithms on several statistical measures endorses our result. This result is promising when employing mechanisms such as data-driven crowd enlistment improve the efficacy of existing code fragment classifiers.
In this paper, we propose the rectangle transformation problem (RTP) and its variants. RTP asks for a transformation by a rectangle partition between two rectangles of the same area. We are interested in the minimum R...
详细信息
—Online monitoring user cardinalities (or degrees) in graph streams is fundamental for many applications. For example in a bipartite graph representing user-website visiting activities, user cardinalities (the number...
详细信息
Automated essay scoring aims to score an essay automatically without any human *** methods heavily rely on manual feature engi-neering,making it expensive to extract the *** recent studies used neural-network-based sc...
详细信息
Automated essay scoring aims to score an essay automatically without any human *** methods heavily rely on manual feature engi-neering,making it expensive to extract the *** recent studies used neural-network-based scoring models to avoid feature *** of them used CNN or RNN to learn the representation of the *** these mod-els can cope with relationships between words within a short distance,they are limited in capturing long-distance relationships across *** particular,it is difficult to assess the coherence of the essay,which is an essential criterion in essay *** this paper,we use self-attention to capture useful long-distance relationships between words so as to estimate a coherence *** tested our model on two datasets(ASAP and a new non-native speaker dataset).In both cases,our model outperforms the existing state-of-the-art models.
This paper proposes an efficient, bi-convex, fuzzy, variational (BFV) method with teaching and learning based optimization (TLBO) for geometric image segmentation. Firstly, we adopt a bi-convex, object function to pro...
详细信息
In this paper, a two-grid method is proposed to linearize and symmetrize the steady-state Poisson-Nernst-Planck equations. The computational system is decoupled to linearize and symmetrize equations by using this meth...
详细信息
暂无评论