End-to-end delay is one of the most important characteristics of Internet end-to-end packet dynamics, which can be applied to quality of services (OoS) management, service level agreement (SLA) management, congest...End-to-end delay is one of the most important characteristics of Internet end-to-end packet dynamics, which can be applied to quality of services (OoS) management, service level agreement (SLA) management, congestion control algorithm development, etc. Nonstationarity and nonlinearity are found by the analysis of various delay series measured from different links. The fact that different types of links have different degree of Self-Similarity is also obtained. By constructing appropriate network architecture and neural functions, functional networks can be used to model the Internet end-to-end nonlinear delay time series. Furthermore, by using adaptive parameter studying algorithm, the nonstationarity can also be well modeled. The numerical results show that the provided functional network architecture and adaptive algorithm can precisely characterize the Internet end-to-end delay dynamics.展开更多
In this paper,we propose an asymmetric encrypted end-to-end communication system based on convolutional neural networks to solve the problem of secure transmission in the end-to-end wireless communication system.The s...In this paper,we propose an asymmetric encrypted end-to-end communication system based on convolutional neural networks to solve the problem of secure transmission in the end-to-end wireless communication system.The system generates a key generator through a convolutional neural network as a bridge.The private and public keys establish a key pair relationship of arbitrary length sequence information.The transmitter and receiver consist of autoencoders based on convolutional neural networks.For data confidentiality requirements,we design the loss function of the end-to-end communication model based on a convolutional neural network.We also design bugs based on different predictions about the information the system eavesdropper has.Simulation results show that the system performs well on additive Gaussian white noise and Rayleigh fading channels.A legitimate party can establish a secure transmission under a designed communication system;an illegal eavesdropper without a key cannot accurately decode it.展开更多
It's a hot issue to improve the accuracy of network coordinate systems(NCS). By analyzing the error source of NCSes, it's emphasized that guaranteeing the low dimensionality of embedding datasets is the princi...It's a hot issue to improve the accuracy of network coordinate systems(NCS). By analyzing the error source of NCSes, it's emphasized that guaranteeing the low dimensionality of embedding datasets is the principle on the designing of NCSes. Based on this observation, a PCA based Internet delay space dividing algorithm(IDSD-PCA) is proposed. Beginning at choosing an optimized sub dataset randomly, IDSD-PCA partitions the Internet delay dataset into several sub datasets with low dimensionality by iterations. After the partition, the whole delay dataset and sub datasets are embedded into a hierarchical NCS. The experimental results show that with this framework both the metric space based models and the non-metric space based models can predict the end-to-end delays more accurately.展开更多
With the speed gap between storage system access and processor computing, end-to-end data processing has become a bottleneck to improve the total performance of computer systems over the Internet. Based on the analysi...With the speed gap between storage system access and processor computing, end-to-end data processing has become a bottleneck to improve the total performance of computer systems over the Internet. Based on the analysis of data processing behavior, an adaptive cache organization scheme is proposed with fast address calculation. This scheme can make full use of the characteristics of stack space data access, adopt fast address calculation strategy, and reduce the hit time of stack access. Adaptively, the stack cache can be turned off from beginning to end, when a stack overflow occurs to avoid the effect of stack switching on processor performance. Also, through the instruction cache and the failure behavior for the data cache, a prefetching policy is developed, which is combined with the data capture of the failover queue state. Finally, the proposed method can maintain the order of instruction and data access, which facilitates the extraction of prefetching in the end-to-end data processing.展开更多
基金This project was supported by the National Natural Science Foundation of China (60132030 60572147)
文摘End-to-end delay is one of the most important characteristics of Internet end-to-end packet dynamics, which can be applied to quality of services (OoS) management, service level agreement (SLA) management, congestion control algorithm development, etc. Nonstationarity and nonlinearity are found by the analysis of various delay series measured from different links. The fact that different types of links have different degree of Self-Similarity is also obtained. By constructing appropriate network architecture and neural functions, functional networks can be used to model the Internet end-to-end nonlinear delay time series. Furthermore, by using adaptive parameter studying algorithm, the nonstationarity can also be well modeled. The numerical results show that the provided functional network architecture and adaptive algorithm can precisely characterize the Internet end-to-end delay dynamics.
基金supported by the National Key Research and Development Program of China(No.2017YFE0135700)the High Level Talent Support Project of Hebei Province(No.A201903011)+3 种基金the Natural Science Foundation of Hebei Province(No.F2018209358)the Tsinghua Precision Medicine Foundation(No.2022TS003)the Telecommunications Research Centre(TRC)of University of Limerick,Ireland,the Science and Education for Smart Growth Operational Program(2014-2020)(No.BG05M2OP001-1.001-0003)co-financed by the European Union through the European Structural and Investment funds.
文摘In this paper,we propose an asymmetric encrypted end-to-end communication system based on convolutional neural networks to solve the problem of secure transmission in the end-to-end wireless communication system.The system generates a key generator through a convolutional neural network as a bridge.The private and public keys establish a key pair relationship of arbitrary length sequence information.The transmitter and receiver consist of autoencoders based on convolutional neural networks.For data confidentiality requirements,we design the loss function of the end-to-end communication model based on a convolutional neural network.We also design bugs based on different predictions about the information the system eavesdropper has.Simulation results show that the system performs well on additive Gaussian white noise and Rayleigh fading channels.A legitimate party can establish a secure transmission under a designed communication system;an illegal eavesdropper without a key cannot accurately decode it.
基金supported by the National Key Research and Development Program of China under Grant No. 2017YFB0801703the National Natural Science Foundation of China under Grant No. 61602114+1 种基金CERNET Innovation Project No. NGII20170406Jiangsu Provincial Key Laboratory of Computer Network Technology
文摘It's a hot issue to improve the accuracy of network coordinate systems(NCS). By analyzing the error source of NCSes, it's emphasized that guaranteeing the low dimensionality of embedding datasets is the principle on the designing of NCSes. Based on this observation, a PCA based Internet delay space dividing algorithm(IDSD-PCA) is proposed. Beginning at choosing an optimized sub dataset randomly, IDSD-PCA partitions the Internet delay dataset into several sub datasets with low dimensionality by iterations. After the partition, the whole delay dataset and sub datasets are embedded into a hierarchical NCS. The experimental results show that with this framework both the metric space based models and the non-metric space based models can predict the end-to-end delays more accurately.
文摘With the speed gap between storage system access and processor computing, end-to-end data processing has become a bottleneck to improve the total performance of computer systems over the Internet. Based on the analysis of data processing behavior, an adaptive cache organization scheme is proposed with fast address calculation. This scheme can make full use of the characteristics of stack space data access, adopt fast address calculation strategy, and reduce the hit time of stack access. Adaptively, the stack cache can be turned off from beginning to end, when a stack overflow occurs to avoid the effect of stack switching on processor performance. Also, through the instruction cache and the failure behavior for the data cache, a prefetching policy is developed, which is combined with the data capture of the failover queue state. Finally, the proposed method can maintain the order of instruction and data access, which facilitates the extraction of prefetching in the end-to-end data processing.