This paper explains some existing challenges for network topology visualization. An XML schema for network topology description is proposed to achieve the interoperability between different network management applicat...
详细信息
This paper describes a visualization design for network information representation. The aim of the design is to provide graphical presentations of large-scale and complex networks and help network administrators to ma...
详细信息
Aiming at the limitations of existing methods of IPv6 network topology discovery, this article proposes and implements a novel algorithm of an IPv6-based topology discovery system for the next generation Internet. Wit...
详细信息
With the increasing use of field-programmable gate arrays (FPGAs) in embedded systems and many embedded applications, the failure to protect FPGA-based embedded systems from cloning attacks has brought serious losse...
详细信息
With the increasing use of field-programmable gate arrays (FPGAs) in embedded systems and many embedded applications, the failure to protect FPGA-based embedded systems from cloning attacks has brought serious losses to system developers. This paper proposes a novel combinational logic binding technique to specially protect FPGA-based embedded systems from cloning attacks and provides a pay-per-device licensing model for the FPGA market. Security analysis shows that the proposed binding scheme is robust against various types of malicious attacks. Experimental evaluations demonstrate the low overhead of the proposed technique.
Integrated Sensing and communication (ISAC) has emerged as a cornerstone technology for achieving seamless coverage in next-generation networks. Moreover, the advent of extremely large-scale multiple-input multiple-ou...
详细信息
Multi-antenna downlink system with much more users than transmit antennas is considered. With both quantized channel direction and unquantized channel magnitude fed back from all users, this system becomes interferenc...
详细信息
In recent years, many hot topics for research are manipulation of big data, cloud computing and a combination of them. OpenStack is a complex and evolving system that continuously generates vast amounts of metrics and...
详细信息
Electromagnetic metasurfaces offer unique advantages over traditional materials in manipulating electromagnetic waves. It is crucial to achieve wavefront control across multiple frequencies within a compact space usin...
详细信息
The interference of performance between the latency-critical tasks and batch tasks leads to a low utilization of the load in the data centers, because of the competition of the system resources to guarantee the latenc...
详细信息
PEGASIS protocol is the classic chain routing protocol, its network is formed into a chain by greedy algorithm, the cluster head is generated by random selection, which is easy to lead to uneven energy consumption of ...
详细信息
暂无评论