Journal of Computer Applications ›› 2014, Vol. 34 ›› Issue (6): 1537-1540.DOI: 10.11772/j.issn.1001-9081.2014.06.1537
• Network and communications • Previous Articles Next Articles
WANG Bo,CHEN Shuqiao,WANG Zhiming,WANG Wengao
Received:
2013-11-29
Revised:
2014-01-13
Online:
2014-06-01
Published:
2014-07-02
Contact:
WANG Bo
通讯作者:
王博
作者简介:
基金资助:
国家973计划项目;国家863计划项目
CLC Number:
WANG Bo CHEN Shuqiao WANG Zhiming WANG Wengao. Energy-aware virtual network embedding algorithm based on topology aggregation[J]. Journal of Computer Applications, 2014, 34(6): 1537-1540.
王博 陈庶樵 王志明 王文钊. 考虑节能的拓扑聚合虚拟网映射算法[J]. 计算机应用, 2014, 34(6): 1537-1540.
[1]ANDERSON T, PETERSON L, SHENKER S, et al. Overcoming the Internet impasse through virtualization [J]. Computer, 2005, 38(4): 34-41. |
[1] | . Moving target defense decision-making algorithm based on multi-stage evolutionary signal game model [J]. Journal of Computer Applications, 0, (): 0-0. |
[2] | ZHU Yuna, ZHANG Yutao, YAN Shaoge, FAN Yudan, CHEN Hantuo. Protocol identification approach based on semi-supervised subspace clustering [J]. Journal of Computer Applications, 2021, 41(10): 2900-2904. |
[3] | XIAO Yuelei, DENG Xiaofan. Improvement and analysis of certificate-based wired local area network security association scheme [J]. Journal of Computer Applications, 2021, 41(7): 1970-1976. |
[4] | . Containerized virtual network embedding algorithm based on time-varying resources [J]. Journal of Computer Applications, 0, (): 0-0. |
[5] | DONG Wentao, LI Zhuo, CHEN Xin. Online short video content distribution strategy based on federated learning [J]. Journal of Computer Applications, 2021, 41(6): 1551-1556. |
[6] | GE Lina, HU Yugu, ZHANG Guifen, CHEN Yuanyuan. Reverse hybrid access control scheme based on object attribute matching in cloud computing environment [J]. Journal of Computer Applications, 2021, 41(6): 1604-1610. |
[7] | WANG Yao, SUN Guozi. Oversampling method for intrusion detection based on clustering and instance hardness [J]. Journal of Computer Applications, 2021, 41(6): 1709-1714. |
[8] | DU Xinyu, WANG Huaqun. Dynamic group based effective identity authentication and key agreement scheme in LTE-A networks [J]. Journal of Computer Applications, 2021, 41(6): 1715-1722. |
[9] | ZHANG Quanlong, WANG Huaibin. Intrusion detection model based on combination of dilated convolution and gated recurrent unit [J]. Journal of Computer Applications, 2021, 41(5): 1372-1377. |
[10] | WANG Yijie, FAN Jiafei, WANG Chenyu. Two-stage task offloading strategy based on game theory in cloud-edge environment [J]. Journal of Computer Applications, 2021, 41(5): 1392-1398. |
[11] | GUO Shuai, SU Yang. Encrypted traffic classification method based on data stream [J]. Journal of Computer Applications, 2021, 41(5): 1386-1391. |
[12] | . Adversarial attack algorithm for deep learning interpretability [J]. Journal of Computer Applications, 0, (): 0-0. |
[13] | ZHU Yongjin, YIN Fei, DOU Longlong, WU Kun, ZHANG Zhiwei, QIAN Zhuzhong. Adaptive network transmission mechanism based on forward error correction [J]. Journal of Computer Applications, 2021, 41(3): 825-832. |
[14] | TANG Yanqiang, LI Chenghai, SONG Yafei. Network security situation prediction based on improved particle swarm optimization and extreme learning machine [J]. Journal of Computer Applications, 2021, 41(3): 768-773. |
[15] | . Looping web page mechanism based on deep tree structure [J]. Journal of Computer Applications, 0, (): 0-0. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||