In a distributed network, there are multiple routing paths between source node and destination node. In order to meet certain demands of network security, selecting required firewalls in multiple routing paths and dep...
详细信息
ISBN:
(纸本)9781849199094
In a distributed network, there are multiple routing paths between source node and destination node. In order to meet certain demands of network security, selecting required firewalls in multiple routing paths and deploying appropriate rules on them are indispensable steps. Thus, in this paper, we carry on a further research on it and propose permit and deny algorithms which serve to improve the performance of network security. Then, we give theoretical proof of our algorithms. Finally, we test the effectiveness of algorithms based on a network simulation platform named mininet. The analysis of time efficiency of our algorithms and previous algorithms, as well as the comparison between them prove the high efficiency of our algorithms.
Distantly supervised relation extraction aims to extract relational facts from texts but suffers from noisy instances. Existing methods usually select reliable sentences that rely on potential noisy labels, resulting ...
详细信息
Using a large number of power amplifiers brings serious nonlinear distortion to 5G communication systems, which becomes a challenging problem for conventional digital predistortion (DPD) to linearize signals. To addre...
详细信息
High-resolution multispectral (HRMS) images combine spatial and spectral information originating from panchromatic (PAN) and reduced-resolution multispectral (LRMS) images. Pansharpening performs well and is widely us...
详细信息
With the reconfigurable intelligent surface (RIS) and unmanned aerial vehicle (UAV) becoming increasingly prevalent in everyday human activities, RIS-UAV assisted wireless communication system helps to extend transmis...
详细信息
Next-basket recommendation (NBR) aims to recommend a set of items to a consumer according to past shopping carts. NBR essientially a more general and complex form than sequential recommendation which recommends the ne...
详细信息
Hypervisor-based fault tolerance (HBFT), a checkpoint-recovery mechanism, is an emerging approach to sustaining mission-critical applications. Based on virtualization technology, HBFT provides an economic and transpar...
详细信息
This research explores significant advancements in semiconductor-based nanomaterials and their crucial applications in addressing environmental challenges. Highlighted for their expansive surface area, chemical stabil...
详细信息
Outlier detection in high-dimensional space is a hot topic in data mining, the main goal is to find out a small quantity of data objects with abnormal behavior in data set. In this paper, the concepts of the feature v...
详细信息
DURING our discussion at workshops for writing“What Does ChatGPT Say:The DAO from Algorithmic Intelligence to Linguistic Intelligence”[1],we had expected the next milestone for Artificial Intelligence(AI)would be in...
详细信息
DURING our discussion at workshops for writing“What Does ChatGPT Say:The DAO from Algorithmic Intelligence to Linguistic Intelligence”[1],we had expected the next milestone for Artificial Intelligence(AI)would be in the direction of Imaginative Intelligence(II),i.e.,something similar to automatic wordsto-videos generation or intelligent digital movies/theater technology that could be used for conducting new“Artificiofactual Experiments”[2]to replace conventional“Counterfactual Experiments”in scientific research and technical development for both natural and social studies[2]-[6].Now we have OpenAI’s Sora,so soon,but this is not the final,actually far away,and it is just the beginning.
暂无评论