There is a growing trend for service providers (SPs) to migrate their multi-tier applications from local clusters to public cloud networks. In the cloud environment, it is a great concern of SPs to improve the availab...
详细信息
ISBN:
(纸本)9781479989386
There is a growing trend for service providers (SPs) to migrate their multi-tier applications from local clusters to public cloud networks. In the cloud environment, it is a great concern of SPs to improve the availability of their virtual networks, in addition to guarantees of their virtual resource requirements, such as VMs and bandwidth. However, meeting these requirements results in an inefficient utilization of physical resources, which goes against the operational goal of cloud providers. To address this challenge, in this paper, we propose an availability-aware virtual network embedding framework that simultaneously improves the availability of virtual networks and the resource efficiency. We first propose a new metric to quantify the availability cost of a multi-tier virtual network, and then formulate the embedding problem as a joint optimization of the aggregated bandwidth and availability costs. Due to the NP-hardness of the embedding problem, we devise a heuristic algorithm that can solve the problem in polynomial time. Extensive simulation results show that the proposed algorithm enables CP to achieve various trade-offs between resource efficiency and availability, and to gain more revenue (e.g., 16.1% under a datacenter load of 80%) than the availability-agonistic algorithm.
Considering its successful application in solving discrete single objective problems, biogeography-based optimization (BBO) is considered as a new promising intelligent algorithm. Therefore, many studies are conducted...
详细信息
With the development of cloud computing, cloud security problem has become a hot topic. Some scholars put forward the role access control based on mapping, which is used to solve the leakage problem of data storing in...
详细信息
This paper presents a deep neural network (DNN) approach to sentence boundary detection in broadcast news. We extract prosodic and lexical features at each inter-word position in the transcripts and learn a sequential...
详细信息
CCA is a powerful tool for analyzing paired multi-view data. However, when facing semi-paired multi-view data which widely exist in real-world problems, CCA usually performs poorly due to its requirement of data pairi...
详细信息
Accurately identifying network traffics at the early stage is very important for the application of traffic *** years,more and more research works have tried to build effective machine learning models to identify traf...
详细信息
Accurately identifying network traffics at the early stage is very important for the application of traffic *** years,more and more research works have tried to build effective machine learning models to identify traffics with the few packets at the early ***,a basic and important problem is still unresolved,that is how many packets are most effective in early stage traffic *** this paper,we try to resolve this problem using experimental *** firstly extract the packet size of the first 2-10 packets of 3 traffic data *** then execute crossover identification experiments with different numbers of packets using 11 well-known machine learning ***,statistical tests are applied to find out which number is the best performed *** experimental results show that 5-7are the best packet numbers for early stage traffic identification.
Traditional unsupervised broadcast news story segmentation approaches have to set the segmentation number manually, while this number is often unknown in real-world applications. In this paper, we solve this problem b...
详细信息
ISBN:
(纸本)9781479928941
Traditional unsupervised broadcast news story segmentation approaches have to set the segmentation number manually, while this number is often unknown in real-world applications. In this paper, we solve this problem by modeling the generative process of stories as distance dependent Chinese restaurant process (dd-CRP) mixtures. We cut a news program into fixed-size text blocks and consider these blocks in the same story are generated from a story-specific topic. Specifically, we add a dd-CRP prior which has an essential bias that the blocks' topic is more likely to be the same with the nearby blocks. Subsequently, story boundaries can be found by detecting the changes of topics. Experiments show that our approach outperforms both supervised and unsupervised approaches and the segmentation number can be automatically learned from data.
computer forensics is an important part of the computer crime investigation. So a Forensics system aimed to Foxmail data analysis and investigation is proposed in this paper. The system can index the email data based ...
详细信息
ISBN:
(纸本)9781479954599
computer forensics is an important part of the computer crime investigation. So a Forensics system aimed to Foxmail data analysis and investigation is proposed in this paper. The system can index the email data based on Lucene technology and the MMSeg participle algorithm, and provides the full text retrieval of the email content function. Subsequently, a visual communication graph would be generated according to the retrieval results. Based on the communication graph, an algorithm on graphic structure analysis is proposed, and by means of centrality and minimum traffic filtering method, multilevel analysis is carried out on the graph, which can detect the possible suspicious personnel and their relationships and provide strong support for the computer crime investigation.
Traffic classification research has been suffering from a trouble of collecting accurate samples with ground truth.A model named Traffic Labeller(TL) is proposed to solve this *** system captures all user socket calls...
详细信息
Traffic classification research has been suffering from a trouble of collecting accurate samples with ground truth.A model named Traffic Labeller(TL) is proposed to solve this *** system captures all user socket calls and their corresponding application process information in the user mode on a Windows *** a sending data call has been captured,its 5-tuple {source IP,destination IP,source port,destination port and transport layer protocol},associated with its application information,is sent to an intermediate NDIS driver in the kernel *** the intermediate driver writes application type information on TOS field of the IP packets which match the *** this way,each IP packet sent from the Windows host carries their application ***,traffic samples collected on the network have been labelled with the accurate application information and can be used for training effective traffic classification models.
Forward-secure signatures are proposed to deal with the key exposure problem. Compared to regular signatures, forward-secure signatures have a special update algorithm that can evolve the new private key in each time ...
详细信息
暂无评论