首页 > 最新文献

2009 International Conference on Networks Security, Wireless Communications and Trusted Computing最新文献

英文 中文
The Effects of Antenna Properties on Read Distance in Passive Backscatter RFID Systems 无源后向散射RFID系统中天线特性对读取距离的影响
Zhijun Tang, Yigang He, ZhouGuo Hou, Bing Li
One of the obstacles to wide adaptation of passive RFID systems is the limited read distance or relatively high error rate due to radio interferences in the passive backscatter RFID systems. The most important tag performance characteristic is read distance at which RFID reader can detect the backscattered signal from the tag. The read distance in passive backscatter RFID systems depends on many factors, e.g. the transmitted power, the frequency used, the gain of the reader and tag antennae, the aperture of the antennae, the quality factor of the antennae, the sensitivity of the readers, modulation type and depth, and the application environment etc. This paper presented an overview of passive backscatter RFID systems and the read distance performance of these systems. We focus on presenting an overview of several antenna parameters impacting on read distance in the passive backscatter RFID systems. The function of antenna gain, operational frequency, radar cross-section, antenna quality factor, and polarization mismatch were analyzed.
无源射频识别系统广泛应用的障碍之一是由于射频干扰造成的读取距离有限或相对较高的误差率。标签最重要的性能特征是读取距离,在该距离上RFID阅读器可以检测到标签的后向散射信号。无源后向散射RFID系统的读取距离取决于许多因素,如发射功率、使用的频率、读写器和标签天线的增益、天线的孔径、天线的质量因子、读写器的灵敏度、调制类型和深度以及应用环境等。本文综述了无源后向散射RFID系统及其读取距离性能。我们重点介绍了影响被动后向散射RFID系统读取距离的几个天线参数的概述。分析了天线增益、工作频率、雷达截面积、天线质量因子和极化失配的函数。
{"title":"The Effects of Antenna Properties on Read Distance in Passive Backscatter RFID Systems","authors":"Zhijun Tang, Yigang He, ZhouGuo Hou, Bing Li","doi":"10.1109/NSWCTC.2009.395","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.395","url":null,"abstract":"One of the obstacles to wide adaptation of passive RFID systems is the limited read distance or relatively high error rate due to radio interferences in the passive backscatter RFID systems. The most important tag performance characteristic is read distance at which RFID reader can detect the backscattered signal from the tag. The read distance in passive backscatter RFID systems depends on many factors, e.g. the transmitted power, the frequency used, the gain of the reader and tag antennae, the aperture of the antennae, the quality factor of the antennae, the sensitivity of the readers, modulation type and depth, and the application environment etc. This paper presented an overview of passive backscatter RFID systems and the read distance performance of these systems. We focus on presenting an overview of several antenna parameters impacting on read distance in the passive backscatter RFID systems. The function of antenna gain, operational frequency, radar cross-section, antenna quality factor, and polarization mismatch were analyzed.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"295 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123037138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Design of Data Transmission System with Coded 8CPFSK Modulation 编码8CPFSK调制数据传输系统的设计
Wenzhe Ma
The data transmission system using octal continuous phase frequency shift keying (CPFSK) modulation is designed for bandwidth and energy efficiency. The baseband pulse shaping technique is adopted for bandwidth efficiency, and the octal ring convolutional trellis code is adopted for energy efficiency. The system model is built and the components are described. Then the simplified baseband simulation model is built. Based on the simulation model, the system performance is studied using computer simulation. Both the theoretical analysis and computer simulation results show that the coded 8CPFSK system outperforms the uncoded 4CPFSK system when the signal to noise ratio is not too low. So it is suitable to use coded 8CPFSK system for data transmission.
采用八进制连续相移频键控(CPFSK)调制的数据传输系统从带宽和能效两方面进行了设计。采用基带脉冲整形技术提高带宽效率,采用八进制环卷积格码提高能量效率。建立了系统模型,对系统组成进行了描述。然后建立了简化的基带仿真模型。在建立仿真模型的基础上,对系统性能进行了计算机仿真研究。理论分析和计算机仿真结果表明,在信噪比不太低的情况下,编码后的8CPFSK系统优于未编码的4CPFSK系统。因此,采用编码8CPFSK系统进行数据传输是非常合适的。
{"title":"Design of Data Transmission System with Coded 8CPFSK Modulation","authors":"Wenzhe Ma","doi":"10.1109/NSWCTC.2009.152","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.152","url":null,"abstract":"The data transmission system using octal continuous phase frequency shift keying (CPFSK) modulation is designed for bandwidth and energy efficiency. The baseband pulse shaping technique is adopted for bandwidth efficiency, and the octal ring convolutional trellis code is adopted for energy efficiency. The system model is built and the components are described. Then the simplified baseband simulation model is built. Based on the simulation model, the system performance is studied using computer simulation. Both the theoretical analysis and computer simulation results show that the coded 8CPFSK system outperforms the uncoded 4CPFSK system when the signal to noise ratio is not too low. So it is suitable to use coded 8CPFSK system for data transmission.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126080331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Utility-Based Resource Dynamic Allocation for Mixed Traffic in Wireless Networks 基于效用的无线网络混合业务资源动态分配
J. Nie, Xiaohui Chen, Weidong Wang
In this paper, resource allocation for mixed traffic in wireless access networks is investigated and a Utility-based Resource Dynamic Allocation (URDA) algorithm is proposed. This algorithm considers the QoS characteristics, real-time resource requirements and wireless channel states that belong to different types of applications, and then generates utility functions of them. The resource is allocated dynamically according to these utility functions. Simulation results indicate that URDA works much better than traditional algorithms and achieves the target of resource allocation optimization.
研究了无线接入网络中混合业务的资源分配问题,提出了一种基于效用的资源动态分配(URDA)算法。该算法综合考虑了不同类型应用的QoS特性、实时资源需求和无线信道状态,生成了它们的效用函数。根据这些实用函数动态地分配资源。仿真结果表明,URDA算法优于传统算法,达到了优化资源分配的目的。
{"title":"Utility-Based Resource Dynamic Allocation for Mixed Traffic in Wireless Networks","authors":"J. Nie, Xiaohui Chen, Weidong Wang","doi":"10.1109/NSWCTC.2009.127","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.127","url":null,"abstract":"In this paper, resource allocation for mixed traffic in wireless access networks is investigated and a Utility-based Resource Dynamic Allocation (URDA) algorithm is proposed. This algorithm considers the QoS characteristics, real-time resource requirements and wireless channel states that belong to different types of applications, and then generates utility functions of them. The resource is allocated dynamically according to these utility functions. Simulation results indicate that URDA works much better than traditional algorithms and achieves the target of resource allocation optimization.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"16 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120972693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Energy-aware AODV Routing for Ad Hoc Networks Ad Hoc网络的能量感知AODV路由
Cao Jianglian, Zhang Zhao-xiao, Zeng Wenli, Pei Tingrui
Routing in Ad hoc Networks has received significant attention with a number of different routing protocols proposed in recent years. DSR, DSDV and AODV are the shortest path protocols for Ad Hoc networks. According to energy, the shortest path may be not the best path. A new mechanism of energy-aware named EAODV for ad hoc is proposed in this paper, which is based on the classical AODV (the routing protocol on demand). In EAODV, The route which spends less energy and owns larger capacity is selected by synthetic analysis. Use software simulating and analyze performance of it. Results show it can save more energy.
自组织网络中的路由问题近年来受到了广泛的关注,提出了许多不同的路由协议。DSR、DSDV和AODV是Ad Hoc网络的最短路径协议。根据能量,最短路径不一定是最佳路径。本文在经典的按需路由协议(AODV)的基础上,提出了一种新的能量感知机制EAODV。在EAODV中,通过综合分析选择能量消耗少、容量大的路由。利用软件进行仿真,并对其性能进行了分析。结果表明,它可以节省更多的能源。
{"title":"Energy-aware AODV Routing for Ad Hoc Networks","authors":"Cao Jianglian, Zhang Zhao-xiao, Zeng Wenli, Pei Tingrui","doi":"10.1109/NSWCTC.2009.66","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.66","url":null,"abstract":"Routing in Ad hoc Networks has received significant attention with a number of different routing protocols proposed in recent years. DSR, DSDV and AODV are the shortest path protocols for Ad Hoc networks. According to energy, the shortest path may be not the best path. A new mechanism of energy-aware named EAODV for ad hoc is proposed in this paper, which is based on the classical AODV (the routing protocol on demand). In EAODV, The route which spends less energy and owns larger capacity is selected by synthetic analysis. Use software simulating and analyze performance of it. Results show it can save more energy.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"69 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114051795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Service Selection Method Based on Constraints in a Lighting Control System 一种基于约束的照明控制系统服务选择方法
Pan Deng, Feng Chen, Xiaohui Rong, Peng Jiang, Wen Jin
Lighting Control System has brought a research focus in workflow technology. Constraints-based service selection is an NP problem. Featured in searching globally, genetic algorithm can be a better option for solving the problem. The paper improve the traditional algorithms for obtaining the higher fitness, Experiment results prove it available and better than some traditional algorithms.
照明控制系统已成为工作流技术的研究热点。基于约束的服务选择是一个NP问题。遗传算法具有全局搜索的特点,是解决这一问题的较好选择。本文对传统算法进行了改进,获得了更高的适应度,实验结果证明了该算法的有效性,并且优于一些传统算法。
{"title":"A Service Selection Method Based on Constraints in a Lighting Control System","authors":"Pan Deng, Feng Chen, Xiaohui Rong, Peng Jiang, Wen Jin","doi":"10.1109/NSWCTC.2009.20","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.20","url":null,"abstract":"Lighting Control System has brought a research focus in workflow technology. Constraints-based service selection is an NP problem. Featured in searching globally, genetic algorithm can be a better option for solving the problem. The paper improve the traditional algorithms for obtaining the higher fitness, Experiment results prove it available and better than some traditional algorithms.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122406314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Threshold Certificate-Based Encryption: Definition and Concrete Construction 基于证书的阈值加密:定义和具体构造
Yang Lu, Jiguo Li, Junmo Xiao
Certificate-based encryption (CBE) is a new paradigm which overcomes the shortcomings of traditional public-key encryption and identity based encryption. CBE provides an efficient implicit certificate mechanism to eliminate third-party queries for the certificate status and to simplify the certificate revocation problem. Therefore, CBE can be used to construct an efficient PKI requiring fewer infrastructures. In addition, it also solves the key escrow and key distribution problem inherent in IBE. In this paper, we introduce a new notion called Threshold Certificate-Based Encryption (TCBE) to overcome the limitations of CBE due to the using of sole master key in the system. It preserves the advantages of CBE such as implicit certificate and no private key escrow. At the same time it also inherits the properties of threshold encryption. We first formalize the definition and security model for TCBE. Then we construct a concrete TCBE scheme which is CCA-secure in the standard model.
基于证书的加密(CBE)是一种新的加密范式,它克服了传统公钥加密和基于身份加密的缺点。CBE提供了一种高效的隐式证书机制,消除了第三方对证书状态的查询,简化了证书撤销问题。因此,使用CBE可以构建一个需要较少基础设施的高效PKI。此外,它还解决了IBE固有的密钥托管和密钥分发问题。本文提出了阈值证书加密(TCBE)的概念,克服了TCBE在系统中使用唯一主密钥的局限性。它保留了CBE的优点,如隐式证书和无私钥托管。同时它也继承了阈值加密的特性。我们首先形式化TCBE的定义和安全模型。然后在标准模型下构造了一个具体的cca安全TCBE方案。
{"title":"Threshold Certificate-Based Encryption: Definition and Concrete Construction","authors":"Yang Lu, Jiguo Li, Junmo Xiao","doi":"10.1109/NSWCTC.2009.105","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.105","url":null,"abstract":"Certificate-based encryption (CBE) is a new paradigm which overcomes the shortcomings of traditional public-key encryption and identity based encryption. CBE provides an efficient implicit certificate mechanism to eliminate third-party queries for the certificate status and to simplify the certificate revocation problem. Therefore, CBE can be used to construct an efficient PKI requiring fewer infrastructures. In addition, it also solves the key escrow and key distribution problem inherent in IBE. In this paper, we introduce a new notion called Threshold Certificate-Based Encryption (TCBE) to overcome the limitations of CBE due to the using of sole master key in the system. It preserves the advantages of CBE such as implicit certificate and no private key escrow. At the same time it also inherits the properties of threshold encryption. We first formalize the definition and security model for TCBE. Then we construct a concrete TCBE scheme which is CCA-secure in the standard model.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122846593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Data Aware Clustering for Data Gathering in Wireless Sensor Networks 无线传感器网络中数据感知聚类的研究
Jie Zheng, Yugui Qu, Bao-hua Zhao
The data fusing ability of cluster head is affected by the correlation of sensed data from different nodes in Wireless sensor networks, which are data centered. This paper analyses the influence of regional data correlation on energy efficiency of clustering protocol, and then proposes a data aware clustering for data gathering (DACDG). DACDG uses residual energy and the correction of sensed data from neighbors to construct clusters, and adopts the way of iterative computing to elect cluster head. Compared with existing protocols, simulation results show that DACDG achieves its goals of consuming less energy, equalizing the energy consumption of all the nodes, as well as extending the network lifetime outstandingly.
在以数据为中心的无线传感器网络中,来自不同节点的感知数据的相关性会影响簇头的数据融合能力。分析了区域数据相关性对聚类协议能效的影响,提出了一种数据感知聚类协议(DACDG)。DACDG利用剩余能量和邻域感知数据的校正来构建聚类,并采用迭代计算的方式来选择簇首。仿真结果表明,与现有协议相比,daccg实现了能耗更低、各节点能耗均衡、网络寿命延长的目标。
{"title":"Data Aware Clustering for Data Gathering in Wireless Sensor Networks","authors":"Jie Zheng, Yugui Qu, Bao-hua Zhao","doi":"10.1109/NSWCTC.2009.70","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.70","url":null,"abstract":"The data fusing ability of cluster head is affected by the correlation of sensed data from different nodes in Wireless sensor networks, which are data centered. This paper analyses the influence of regional data correlation on energy efficiency of clustering protocol, and then proposes a data aware clustering for data gathering (DACDG). DACDG uses residual energy and the correction of sensed data from neighbors to construct clusters, and adopts the way of iterative computing to elect cluster head. Compared with existing protocols, simulation results show that DACDG achieves its goals of consuming less energy, equalizing the energy consumption of all the nodes, as well as extending the network lifetime outstandingly.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127683838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Evaluation Method for the Network Reliability Based on the Entropy Measures 基于熵测度的网络可靠性评价方法
Yu Jiang, A. Hu, Ming He
An evaluation method for the network reliability of communication networks based on the entropy measures is presented. Without the previous knowledge of the reliability of nodes and links, this method quantizes the uncertainty of the link and node importance through the entropy measures and evaluates the network reliability according to the network entropy. The theoretical analysis indicates that the proposed algorithm outperforms the existing algorithms. The experimental results demonstrate the efficiency of the proposed algorithm.
提出了一种基于熵测度的通信网络可靠性评价方法。该方法在不知道节点和链路可靠性的前提下,通过熵度量来量化链路和节点重要性的不确定性,并根据网络熵来评估网络的可靠性。理论分析表明,该算法优于现有算法。实验结果证明了该算法的有效性。
{"title":"Evaluation Method for the Network Reliability Based on the Entropy Measures","authors":"Yu Jiang, A. Hu, Ming He","doi":"10.1109/NSWCTC.2009.128","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.128","url":null,"abstract":"An evaluation method for the network reliability of communication networks based on the entropy measures is presented. Without the previous knowledge of the reliability of nodes and links, this method quantizes the uncertainty of the link and node importance through the entropy measures and evaluates the network reliability according to the network entropy. The theoretical analysis indicates that the proposed algorithm outperforms the existing algorithms. The experimental results demonstrate the efficiency of the proposed algorithm.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128033777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The Maneuverable Single Based Station Position Method in the Non-Line-of-Sight Cellular Environment 非视距蜂窝环境下机动单基站定位方法
Yang Tianchi, Jin Liang
The single-station-location research arouses more and more attention for the advantage of simplicity, flexibility and maneuverability. This paper proposed a method of location the mobile station by using a single base station under the non-line-of-sight environment. Each position and scattering distance of scatters can be estimated through the circle fitting algorithm, so the problem of single-station-location is converted to the multi-station-location problem. The simulation result also verified the ability of this method.
单站定位以其简单、灵活、可操作性等优点越来越受到人们的重视。提出了一种在非视距环境下利用单个基站对移动基站进行定位的方法。通过圆拟合算法可以估计散射体的每个位置和散射距离,从而将单站定位问题转化为多站定位问题。仿真结果也验证了该方法的有效性。
{"title":"The Maneuverable Single Based Station Position Method in the Non-Line-of-Sight Cellular Environment","authors":"Yang Tianchi, Jin Liang","doi":"10.1109/NSWCTC.2009.120","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.120","url":null,"abstract":"The single-station-location research arouses more and more attention for the advantage of simplicity, flexibility and maneuverability. This paper proposed a method of location the mobile station by using a single base station under the non-line-of-sight environment. Each position and scattering distance of scatters can be estimated through the circle fitting algorithm, so the problem of single-station-location is converted to the multi-station-location problem. The simulation result also verified the ability of this method.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128057028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Random Edge Deletion in Directed Scale-Free Graphs 有向无标度图中的随机边删除
Yunzhi Yan, Han-Xing Wang
This paper investigates a random edge deletion model for directed scale-free graphs that grow with preferential attachment depending on the in- and out-degrees, we show that the resulting in- and out-degree distributions are power laws with correlated exponents, reproducing observed properties of the world-wide web.
本文研究了一个有向无标度图的随机边删除模型,该模型依赖于输入度和输出度的优先附着物生长,我们证明了输入度和输出度分布是指数相关的幂律,再现了世界范围内网络的观测特性。
{"title":"Random Edge Deletion in Directed Scale-Free Graphs","authors":"Yunzhi Yan, Han-Xing Wang","doi":"10.1109/NSWCTC.2009.309","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.309","url":null,"abstract":"This paper investigates a random edge deletion model for directed scale-free graphs that grow with preferential attachment depending on the in- and out-degrees, we show that the resulting in- and out-degree distributions are power laws with correlated exponents, reproducing observed properties of the world-wide web.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133930594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2009 International Conference on Networks Security, Wireless Communications and Trusted Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1