全部文献期刊会议图书|学者科研项目
中外文文献  中文文献  外文文献
作者:Elisa Rojas , Joaquin Alvarez-Horcajo , Isaias Martinez-Yelmo ...
来源:[J].Annals of Telecommunications(IF 0.567), 2017, Vol.72 (11-12), pp.693-702
摘要:Deployment and maintenance of current data center networks is costly and prone to errors. In order to avoid manual configuration, many of them require centralized administrators which constitute a clear bottleneck, while distributed approaches do not guarantee sufficient flexibil...
作者:Gaurav Somani , Manoj Singh Gaur , Dheeraj Sanghi ...
来源:[J].Annals of Telecommunications(IF 0.567), 2017, Vol.72 (5-6), pp.237-252
摘要:Current trends in distributed denial of service (DDoS) attacks show variations in terms of attack motivation, planning, infrastructure, and scale. “DDoS-for-Hire” and “DDoS mitigation as a Service” are the two services, which are available to attackers and victims, resp...
作者:Zhao-Xu Yang , Guang-She Zhao , Guoqi Li ...
来源:[J].Annals of Telecommunications(IF 0.567), 2017, Vol.72 (11-12), pp.703-715
摘要:Maximization the capacity region of Gaussian multiple access channels with vector inputs and vector outputs has been extensively studied in existing schemes. Although these schemes are proven effective in various real-life applications, they are inapplicable to deal with channels...
作者:Yang Lu , Gang Wang , Jiguo Li ...
来源:[J].Annals of Telecommunications(IF 0.567), 2017, Vol.72 (5-6), pp.359-370
摘要:Public key encryption with keyword search is a useful primitive that provides searchable ciphertexts for some predefined keywords. It allows a user to send a trapdoor to a storage server, which enables the latter to locate all encrypted data containing the keyword(s) encoded...
作者:Laisen Nie , Dingde Jiang , Zhihan Lv
来源:[J].Annals of Telecommunications(IF 0.567), 2017, Vol.72 (5-6), pp.297-305
摘要:With the rapid development of a cloud computing network, the network security has been a terrible problem when it provides much more services and applications. Network traffic modeling and analysis is significantly crucial to detect some lawless activities such as DDoS, viru...
作者:Junjie Pang , Gaochao Xu , Xiaodong Fu ...
来源:[J].Annals of Telecommunications(IF 0.567), 2017, Vol.72 (9-10), pp.597-605
摘要:Data center networks (DCNs), which serve as the infrastructural backbone of big data, have been receiving increasing attention recently. To improve the service quality of data centers, researchers have been working on congestion control, network monitoring, and performance optimi...
作者:Lan Wu , Chenglin Wen
来源:[J].Annals of Telecommunications(IF 0.567), 2017, Vol.72 (7-8), pp.483-490
摘要:In this paper, a new synthesis filter is designed for filter bank systems with transmission delay by adapting random time delay or data-missing situations in the communication network. Firstly, we formulate a mathematical description of the data transmission delay and a measureme...
作者:Enrico Ferrera , Davide Conzon , Paolo Brizzi ...
来源:[J].Annals of Telecommunications(IF 0.567), 2017, Vol.72 (7-8), pp.443-457
摘要:The information technology ecosystem is today facing many radical and methodological changes driven by the Internet-of-Things (IoT): those innovations impact at various levels, ranging from the device-to-device communication paradigms to the value-added services built on top...
作者:Aida Ben Chehida Douss , Ryma Abassi , Sihem Guemara El Fatmi
来源:[J].Annals of Telecommunications(IF 0.567), 2017, Vol.72 (7-8), pp.491-498
摘要:Due to the lack of centralized administration or fixed network infrastructure, classic routing protocols cannot be applied in mobile ad hoc network (MANET). Hence, some specific ones have been proposed. Paradoxically, due to its importance in the MANET deployment, routing constit...
作者:Virginia Pilloni , Luigi Atzori
来源:[J].Annals of Telecommunications(IF 0.567), 2017, Vol.72 (7-8), pp.415-429
摘要:The pervasive use of smart objects is encouraging the development of the Internet of Things (IoT) vision, where even the most common and simple object is expected to acquire information from the surrounding ambient and to cooperate with other objects to achieve a common goal . In...

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×