Advanced Search

    column
    Network Function Virtualization Technology Research
    Zhou Weilin, Yang Yuan, Xu Mingwei
    2018, 55(4): 675-688. DOI: 10.7544/issn1000-1239.2018.20170937
    Abstract PDF
    High Performance Load Balancing Mechanism for Network Function Virtualization
    Wang Yuwei, Liu Min, Ma Cheng, Li Pengfei
    2018, 55(4): 689-703. DOI: 10.7544/issn1000-1239.2018.20170923
    Abstract PDF
    Real-Time Link Fault Detection as a Service for Datacenter Network
    Wang Junxiao, Qi Heng, Li Keqiu, Zhou Xiaobo
    2018, 55(4): 704-716. DOI: 10.7544/issn1000-1239.2018.20170941
    Abstract PDF
    DrawerPipe: A Reconfigurable Packet Processing Pipeline for FPGA
    Li Junnan, Yang Xiangrui, Sun Zhigang
    2018, 55(4): 717-728. DOI: 10.7544/issn1000-1239.2018.20170927
    Abstract PDF
    Packets Transmission with Multiple Levels of Credibility and Routing Calculation Based on Virtual Topologies
    Chen Wenlong, Zhao Yirong, Xiao Rong, Tang Xiaolan, Xu Ke
    2018, 55(4): 729-737. DOI: 10.7544/issn1000-1239.2018.20170946
    Abstract PDF
    Delay-Aware Resource Scheduling Optimization in Network Function Virtualization
    Xu Ran, Wang Wendong, Gong Xiangyang, Que Xirong
    2018, 55(4): 738-747. DOI: 10.7544/issn1000-1239.2018.20170926
    Abstract PDF
    A Hierarchical Method for Survivable Service Function Chain Embedding
    Liu Yi, Zhang Hongqi, Yang Yingjie, Chang Dexian
    2018, 55(4): 748-767. DOI: 10.7544/issn1000-1239.2018.20170938
    Abstract PDF
    A Backup and Recovery Mechanism for Security Service Chain Fault in Network Function Virtualization Environment
    Huang Rui, Zhang Hongqi, Chang Dexian
    2018, 55(4): 768-781. DOI: 10.7544/issn1000-1239.2018.20170942
    Abstract PDF
    A Method of Computing Minimal Diagnoses Based on Pseudo-Failure-Degree to Create New Enumeration Tree
    Ouyang Dantong, Zhi Huayun, Liu Bowen, Zhang Liming, Zhang Yonggang
    2018, 55(4): 782-790. DOI: 10.7544/issn1000-1239.2018.20170016
    Abstract PDF
    Computing the Minimal Hitting Sets with Dynamic Maximum Element Coverage Value
    Deng Zhaoyong, Ouyang Dantong, Geng Xuena, Liu Jie
    2018, 55(4): 791-801. DOI: 10.7544/issn1000-1239.2018.20160900
    Abstract PDF
    Intuitionistic Fuzzy Entropy Feature Selection Algorithm Based on Adaptive Neighborhood Space Rough Set Model
    Yao Sheng, Xu Feng, Zhao Peng, Ji Xia
    2018, 55(4): 802-814. DOI: 10.7544/issn1000-1239.2018.20160919
    Abstract PDF
    Anomaly Detection Algorithm of Data Center Network Based on LSDB
    Xu Gang, Wang Zhan, Zang Dawei, An Xuejun
    2018, 55(4): 815-830. DOI: 10.7544/issn1000-1239.2018.20160970
    Abstract PDF
    Route Prediction Method for Network Intrusion Using Absorbing Markov Chain
    Hu Hao, Liu Yuling, Zhang Hongqi, Yang Yingjie, Ye Runguo
    2018, 55(4): 831-845. DOI: 10.7544/issn1000-1239.2018.20170087
    Abstract PDF
    Multi-Authority Attribute-Based Encryption Scheme with Privacy Protection
    Yan Xixi, Liu Yuan, Li Zichen, Tang Yongli
    2018, 55(4): 846-853. DOI: 10.7544/issn1000-1239.2018.20161043
    Abstract PDF
    A Novel VoIP Steganography Method Based on Bayesian Network and Matrix Embedding
    Gao Zhanzhan, Tang Guangming, Wang Shuo
    2018, 55(4): 854-863. DOI: 10.7544/issn1000-1239.2018.20161042
    Abstract PDF
    Memcached Optimization on High Performance I/O Technology
    An Zhongqi, Du Hao, Li Qiang, Huo Zhigang, Ma Jie
    2018, 55(4): 864-874. DOI: 10.7544/issn1000-1239.2018.20160890
    Abstract PDF
    Porting and Optimizing GTC-P on TaihuLight Supercomputer with OpenACC
    Wang Yichao, Lin Xinhua, Cai Linjin, Tang William, Ethier Stephane, Wang Bei, See Simon, Satoshi Matsuoka
    2018, 55(4): 875-884. DOI: 10.7544/issn1000-1239.2018.20160871
    Abstract PDF
    A Direct Send Image Compositing Algorithm with Minimal Communication Costs
    Wang Pan, Yang Pingli, Huang Shaohua, Lin Chengdi, Kong Longxing
    2018, 55(4): 885-892. DOI: 10.7544/issn1000-1239.2018.20160875
    Abstract PDF