Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
The dynamic placement of virtual network functions
This paper addresses the problem of managing highly dynamic network and service
environments, where virtual nodes and virtual links are created and destroyed depending on …
environments, where virtual nodes and virtual links are created and destroyed depending on …
Adaptive resource management and control in software defined networks
D Tuncer, M Charalambides… - IEEE transactions on …, 2015 - ieeexplore.ieee.org
The heterogeneous nature of the applications, technologies and equipment that today's
networks have to support has made the management of such infrastructures a complex task …
networks have to support has made the management of such infrastructures a complex task …
A novel approach for efficient usage of intrusion detection system in mobile ad hoc networks
Mobile ad hoc networks (MANETs) are self-configuring infrastructureless dynamic wireless
networks in which the nodes are resource constrained. Intrusion detection systems (IDSs) …
networks in which the nodes are resource constrained. Intrusion detection systems (IDSs) …
Softwarization of future networks and services-programmable enabled networks as next generation software defined networks
The Software Defined Networks (SDNs) and Network Functions Virtualisation (NFVs), as
recent separate research and development trends have the roots in programmable/active …
recent separate research and development trends have the roots in programmable/active …
Efficient hash-routing and domain clustering techniques for information-centric networks
Hash-routing is a well-known technique used in server-cluster environments to direct
content requests to the responsible servers hosting the requested content. In this work, we …
content requests to the responsible servers hosting the requested content. In this work, we …
Passive OS fingerprinting by DNS traffic analysis
T Matsunaka, A Yamada… - 2013 IEEE 27th …, 2013 - ieeexplore.ieee.org
In this paper, we propose a new passive OS fingerprinting method which only requires DNS
traffic analysis. The method utilizes characteristics on DNS queries specific to each OS, eg …
traffic analysis. The method utilizes characteristics on DNS queries specific to each OS, eg …
Toward future networks: A viewpoint from ITU-T
D Matsubara, T Egawa, N Nishinaga… - IEEE …, 2013 - ieeexplore.ieee.org
There have been continuous efforts and progress regarding the research and development
of future network technologies in recent years, such as network virtualization and software …
of future network technologies in recent years, such as network virtualization and software …
A service-aware virtualized software-defined infrastructure
The Internet infrastructure is gradually improving its flexibility and adaptability due to the
incorporation of new promising technologies, such as the software-defined networks and the …
incorporation of new promising technologies, such as the software-defined networks and the …
Energy-aware adaptive network resource management
M Charalambides, D Tuncer… - 2013 IFIP/IEEE …, 2013 - ieeexplore.ieee.org
Resource over-provisioning is common practice in network infrastructures. Coupled with
energy unaware networking protocols, this can lead to periods of resource underutilization …
energy unaware networking protocols, this can lead to periods of resource underutilization …
Information exchange management as a service for network function virtualization environments
The Internet landscape is gradually adopting new communication paradigms characterized
by flexibility and adaptability to the resource constraints and service requirements, including …
by flexibility and adaptability to the resource constraints and service requirements, including …