Zobrazeno 1 - 10
of 224
pro vyhledávání: '"Shun-Zheng Yu"'
Publikováno v:
IEEE Access, Vol 8, Pp 38538-38545 (2020)
Network security for cloud computing is very important. Service function chain (SFC) that integrates software defined network (SDN) and network function virtualization (NFV) can provide a new approach for solving the network security issues for cloud
Externí odkaz:
https://doaj.org/article/75068447962c404cbf1b096708dba9a4
Autor:
Shun-Zheng Yu
Publikováno v:
IEEE Transactions on Neural Networks and Learning Systems. 33:3120-3130
Recurrent neural networks (RNNs) can be used to operate over sequences of vectors and have been successfully applied to a variety of problems. However, it is hard to use RNNs to model the variable dwell time of the hidden state underlying an input se
Publikováno v:
Tongxin xuebao, Vol 37, Pp 119-128 (2016)
A left-to-right inhomogeneous cascaded hidden Markov modelwas proposed and applied to model application protocol messages.The proposed modeldescribed the transition probabilities between states and the evolution rule of phases inside the states,revea
Externí odkaz:
https://doaj.org/article/824f079ab1144b6ea7bb39648e75ea61
Publikováno v:
Tongxin xuebao, Vol 36, Pp 173-182 (2015)
In-network caching is one of the most important features of ICN (information-centric networks).A caching strategy based on node’s importance to community was proposed to make content objects cached more reasonable in temporal and spatial distributi
Externí odkaz:
https://doaj.org/article/9dbcb2512dc94c9faf9db00d1efd3593
Autor:
Bian-qin WANG, Shun-zheng YU
Publikováno v:
Tongxin xuebao, Vol 35, Pp 164-171 (2014)
The features of unknown network applications can be extracted using its traffic data. However, the sample traffic in network engineering is usually a mixed traffic generated by several unknown applications. The separation of the mixed traffic by appl
Externí odkaz:
https://doaj.org/article/a7c35f6bbba7465a910f9a62a03003d7
Publikováno v:
Tongxin xuebao, Vol 34, Pp 36-46 (2013)
Since pure theory network coding had some drawbacks in practical network,however current opportunistic network coding fully depends on overheard information.Thus,in a radically different way from network coding optimization,a novel opportunistic netw
Externí odkaz:
https://doaj.org/article/5d9780823158438591a5c8d2b0738a03
Autor:
Jun CAI, Shun-zheng YU
Publikováno v:
Tongxin xuebao, Vol 34, Pp 171-179 (2013)
An efficient weakening community structure strategy (WCS) by adding links to the existing networks was propose,which could enhance Internet transmission performance.Internet topology reconstruction could be realized by WCS strategy,because lightpaths
Externí odkaz:
https://doaj.org/article/7a45a463278c48ed97bd3c17e5f914b7
Autor:
Bian-qin WANG, Shun-zheng YU
Publikováno v:
Tongxin xuebao, Vol 34, Pp 127-137 (2013)
An adaptive application signature extraction method (AdapSig) was proposed.AdapSig firstly extracted keyword sequences from payloads of packets,and then negative examples and redundancy filter were used to generate candidate signatures.An adaptive me
Externí odkaz:
https://doaj.org/article/7991dd2fa4464f0c93a7497650f164b1
Publikováno v:
IEEE Access, Vol 8, Pp 38538-38545 (2020)
Network security for cloud computing is very important. Service function chain (SFC) that integrates software defined network (SDN) and network function virtualization (NFV) can provide a new approach for solving the network security issues for cloud
Autor:
Ming-Ming, Xiao, Shun-Zheng, Yu
Publikováno v:
In Procedia Engineering 2011 15:3764-3768