Network slicing architecture is expected to fulfill network applications with heterogeneous requirements through efficient slice admission control (SAC) policies. Existing SAC approaches entirely rely on current limit...
详细信息
Approximate membership query (AMQ) structures represented by the Bloom Filter and its variants have been popularly researched in recent years. Researchers have recently combined machine learning with this type of stru...
详细信息
Autonomy is an effective approach to cracking some hard nuts in an intelligent system. In this study on intelligent home network, the focus is placed on the implementation of autonomy of a device. For this reason, som...
详细信息
Quantum control requires high-precision and robust control pulses to ensure optimal system performance. However, control sequences generated with a system model may suffer from model bias, leading to low fidelity. Whi...
详细信息
Angel of departure(AOD) based distributed localization scheme in wireless sensor networks allows the single antenna sensor node to estimate its own AOD information by an equivalent antenna array for further position *...
详细信息
Angel of departure(AOD) based distributed localization scheme in wireless sensor networks allows the single antenna sensor node to estimate its own AOD information by an equivalent antenna array for further position ***,the condition that the number of antennas at the multi-antenna agent/anchor node should be larger than the number of multipath signal components(MPCs) constrains its actual *** this paper,we provide a more practical approach to achieve AOD information estimation under multipath *** that the sensor node can not identify the line of sight(LOS) signal component due to the insufficient degree of freedom,which is determined by the above limiting condition,we introduce a synthetic aperture technique with the aid of a fast moving multi-antenna agent/anchor *** operation greatly enlarges the degree of freedom of the equivalent antenna array constructed at sensor node end but without requiring other extra physical antennas equipped at agent/anchor node or sensor node end,which means that it relaxes the limiting ***,the AOD information of LOS signal component can be estimated and extracted successfully in complex multipath *** analysis proves the effectiveness of our proposed synthetic aperture technique and numerical simulations show great performance improvement.
Botnets are used by hackers to conduct cyber attacks and pose a huge threat to Internet users. The key of botnets is the command and control (CC) channels. security researchers can keep track of a botnet by capturing ...
详细信息
Shadowsocks is one of the most popular encryption proxies. It is designed with few defense methods against website fingerprinting attack (WFP). WFP can identify user accessed websites by analyzing Shadowsocks traffic....
详细信息
In recent years, a new type of DDoS attacks against backbone routing links have appeared. They paralyze the communication network of a large area by directly congesting the key routing links concerning the network acc...
详细信息
DoS attacks are currently one of the main security issues threatening the Internet. The harm caused by DDoS attacks and effective countermeasures have been research hot topics in the field of network security. However...
详细信息
Measuring software execution is important for many software engineering tasks. In this paper, Densification Power Law (DPL) of software execution is measured and studied as a feature of growing software complexity. De...
详细信息
ISBN:
(纸本)9781450328548
Measuring software execution is important for many software engineering tasks. In this paper, Densification Power Law (DPL) of software execution is measured and studied as a feature of growing software complexity. Densification means that during a networked system's evolution, it usually becomes denser and the number of edges and nodes grows with a consistent super linear relation. This feature was discovered and reported in 2005. In this paper, based on a measurement of 15 open-source Java programs, we show that when software systems are modeled as a series of dynamic Call Graphs during their executions, they always obey DPL with very close correlation. Then a comparison between static Call Graph and DPL is presented, showing that DPL's properties cannot be derived statically. An explanation for DPL of software execution is given and verified. We believe the universality of DPL makes it an appropriate metric for software execution process. Copyright 2014 ACM.
暂无评论