Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Security measures 3
- Computer security 2
- COMPUTERS / Desktop Applications / Suites 1
- Cloud computing 1
- Computer network protocols 1
- Computer systems 1
- Cyberterrorism 1
- Data transmission systems 1
- Design and construction 1
- Distributed processing 1
- Electronic data processing 1
- Internet 1
- Intranets (Computer networks) 1
- Management 1
- Prevention 1
- Social media 1
- Web servers 1
- World Wide Web 1
-
21
Dynamic computing offloading strategy in LEO constellation edge computing network
Published 2024-07-01“…In satellite edge computing networks, when too many ground users access the satellite through the same channel, the resulting co-channel interference will lead to edge computing performance degradation. …”
Get full text
Article -
22
Distributed Task Offloading Game in Multiserver Mobile Edge Computing Networks
Published 2020-01-01Get full text
Article -
23
Text analysis of DNS queries for data exfiltration protection of computer networks
Published 2020-09-01Subjects: Get full text
Article -
24
Dynamics of a Delayed Model for the Transmission of Malicious Objects in Computer Network
Published 2014-01-01“…An SEIQRS model for the transmission of malicious objects in computer network with two delays is investigated in this paper. …”
Get full text
Article -
25
Hunting the Pertinency of Bloom Filter in Computer Networking and Beyond: A Survey
Published 2019-01-01“…Journal of Computer Networks and Communications…”
Get full text
Article -
26
Research on Migration or Deployment of Telecom Network Management System on Cloud Computing Network
Published 2015-06-01“…Some key problems of system migration or deployment process on cloud computing network were analyzed. The specific method of system resources distribution and calculation,expansion reference coefficients,Oracle database cloud concern points,double disaster recovery system,same city or remote cities disaster recovery systems in cloud solutions were explored. …”
Get full text
Article -
27
Research on intelligent computing network technology for large-scale pre-trained models
Published 2024-06-01Subjects: “…intelligent computing network…”
Get full text
Article -
28
Some key technical issues in the evolution from cloud network to computing network
Published 2021-10-01“…Firstly, the development trend of cloud-network integration technology in recent years, the new problems and challenges it faces were analyzed.Then, based on the heterogeneous computing power, the sinking of computing power, and the new changes in computing-network linkage in business development, six major computing and network capabilities were proposed.Convergence requirements, combined with multi-cloud connection, differentiated bearer, and hierarchical security, discussed the case of building new capabilities and new business experience around the computing network.The analysis results show that it can be concluded that the computing network and the cloud network are closely related in the technical system, and the integration of the computing network is the inevitable result of the development and evolution of the integration of the cloud and the network, and it is also an inevitable choice for the development of the digital economy.…”
Get full text
Article -
29
Task collaborative offloading scheme in vehicle multi-access edge computing network
Published 2019-03-01“…In order to solve the problem that traditional mobile edge computing network can’t be straightforwardly applied to the Internet of vehicles (IoV) due to high speed mobility and dynamic network topology,a vehicular edge multi-access computing network (VE-MACN) was introduced to realize collaborative computing offloading between roadside units and smart vehicles.In this context,the collaborative computation offloading was formulated as a joint multi-access model selection and task assignment problem to realize the good balance between long-term system utility,diverse needs of IoV applications and energy consumption.Considering the complex joint optimization problem,a deep reinforcement learning-based collaborative computing offloading scheme was designed to overcome the curse of dimensionality for Q-learning algorithm.The simulation results demonstrate that the feasibility and effectiveness of proposed offloading scheme.…”
Get full text
Article -
30
Joint optimization method of intelligent service arrangement and computing-networking resource allocation for MEC
Published 2023-07-01“…To solve the problems of low efficiency of network service caching and computing-networking resource allocation caused by tasks differentiation, highly dynamic network environment, and decentralized computing-networking resource deployment in edge networks, a decentralized service arrangement and computing offloading model for mobile edge computing was investigated and established.Considering the multidimensional resource constraints, e.g., computing power, storage, and bandwidth, with the objective of minimizing task processing latency, the joint optimization of service caching and computing-networking resource allocation was abstracted as a partially observable Markov decision process.Considering the temporal dependency of service request and its coupling relationship with service caching, a long short-term memory network was introduced to capture time-related network state information.Then, based on recurrent multi-agent deep reinforcement learning, a distributed service arrangement and resource allocation algorithm was proposed to autonomously decide service caching and computing-networking resource allocation strategies.Simulation results demonstrate that significant performance improvements in terms of cache hit rate and task processing latency achieved by the proposed algorithm.…”
Get full text
Article -
31
New strategies to solve multi criteria optimization problems applying a computer network
Published 2003-12-01“…The experiments with a computer network suggest a more effective strategy to solve a problem applying a single computer. …”
Get full text
Article -
32
Recovery mechanism of large-scale damaged edge computing network in industrial Internet of things
Published 2021-04-01“…Given the limited resources at early stages for recovery, a failure recovery mechanism of the edge computing network considering both computational demands and repair costs was proposed, which intends to tackle the problem of the high probability of large-scale cascading failure caused by the interdependence between the edge computing network and other subnetworks in industrial Internet of things (IIoT).Considering the network structure (topology and link capacity) and network dynamics (computational demands), a joint link recovery selection and computation migration optimization problem was formulated under the conservation of node computing requirements.By leveraging the Benders decomposition algorithm, the NP-hard problem was transformed into a main problem and a sub-problem, which were interdependent and could be solved in polynomial time through the approximation of cutting planes.A local branching method was further introduced to guarantee the non-increasing nature of the Benders upper bound, thus accelerating the convergence of Benders decomposition.Simulation results demonstrate that the proposed algorithm outperforms the conventional topology-based recovery algorithm in system utility, and can perform well in multiple scenarios.…”
Get full text
Article -
33
Multi-tenant computing network resource allocation algorithm based on deep reinforcement learning
Published 2024-12-01“…With the rapid advancement of intelligent businesses, the pre-existing relationship between traditional network architectures and computing capabilities has made it difficult to meet the current demands, making the implementation of computing-network convergence inevitable. Under the new computing power network framework brought about by the convergence of computing networks, efficient and intelligent resource scheduling strategy has become a key link to improve user experience. …”
Get full text
Article -
34
-
35
Service function chain embedding algorithm with wireless multicast in mobile edge computing network
Published 2020-10-01Get full text
Article -
36
Is low‐rate distributed denial of service a great threat to the Internet?
Published 2021-09-01Subjects: Get full text
Article -
37
Revolutionizing load harmony in edge computing networks with probabilistic cellular automata and Markov decision processes
Published 2025-01-01“…Abstract In general, edge computing networks are based on a distributed computing environment and hence, present some difficulties to obtain an appropriate load balancing, especially under dynamic workload and limited resources. …”
Get full text
Article -
38
Deterministic and Stochastic Study for an Infected Computer Network Model Powered by a System of Antivirus Programs
Published 2017-01-01“…This model describes the spread of viruses into an infected computer network which is powered by a system of antivirus software. …”
Get full text
Article -
39
Research on intrusion response strategy based on static Bayesian game in mobile edge computing network
Published 2023-02-01Get full text
Article -
40