首页 > 最新文献

Computer Communications最新文献

英文 中文
A comprehensive framework for 5G indoor localization 5G 室内定位综合框架
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-09 DOI: 10.1016/j.comcom.2024.107968
Antonin Le Floch , Rahim Kacimi , Pierre Druart , Yoann Lefebvre , André-Luc Beylot
Localization inside legacy private 5G networks is a daunting task that involves solving the problem of indoor localization using commercial off-the-shelf proprietary hardware. While some previous work has focused on experimental analysis, none has undertaken to develop a realistic solution based on commercial equipment. In this study, we present the first comprehensive and concrete 5G framework that combines fingerprinting with the 3GPP Enhanced Cell ID (E-CID) approach. Our methodology consists of a machine-learning model to deduce the user’s position by comparing the signal strength received from the User Equipment (UE) with a reference radio power map. To achieve this, the 3GPP protocols and functions are improved to provide open, centralized, and universal localization functions. A new reference map paradigm named Optical Radio Power Estimation using Light Analysis (ORPELA) is introduced. Real-world experiments prove that it is reproducible and more accurate than state-of-the-art radio-planning software. Machine-learning models are then designed, trained, and optimized for an ultra-challenging radio context. Finally, a large-scale experimental campaign encompassing a wide range of cases, including line-of-sight or mobility, is being conducted to demonstrate expected location performance within realistic 5G private networks.
在传统专用 5G 网络内进行定位是一项艰巨的任务,涉及使用现成的商用专有硬件解决室内定位问题。虽然以前的一些工作侧重于实验分析,但还没有人着手开发基于商用设备的现实解决方案。在本研究中,我们首次提出了将指纹识别与 3GPP 增强小区 ID(E-CID)方法相结合的全面而具体的 5G 框架。我们的方法包括一个机器学习模型,通过比较从用户设备(UE)接收到的信号强度和参考无线电功率图来推断用户的位置。为此,我们改进了 3GPP 协议和功能,以提供开放、集中和通用的定位功能。我们引入了一种名为 "利用光分析的光学无线电功率估算(ORPELA)"的新参考图范例。真实世界的实验证明,它具有可重复性,而且比最先进的无线电规划软件更加精确。然后,针对极具挑战性的无线电环境设计、训练和优化了机器学习模型。最后,正在进行大规模的实验活动,包括视距或移动性等多种情况,以证明在现实的 5G 专用网络中的预期定位性能。
{"title":"A comprehensive framework for 5G indoor localization","authors":"Antonin Le Floch ,&nbsp;Rahim Kacimi ,&nbsp;Pierre Druart ,&nbsp;Yoann Lefebvre ,&nbsp;André-Luc Beylot","doi":"10.1016/j.comcom.2024.107968","DOIUrl":"10.1016/j.comcom.2024.107968","url":null,"abstract":"<div><div>Localization inside legacy private 5G networks is a daunting task that involves solving the problem of indoor localization using commercial off-the-shelf proprietary hardware. While some previous work has focused on experimental analysis, none has undertaken to develop a realistic solution based on commercial equipment. In this study, we present the first comprehensive and concrete 5G framework that combines fingerprinting with the 3GPP Enhanced Cell ID (E-CID) approach. Our methodology consists of a machine-learning model to deduce the user’s position by comparing the signal strength received from the User Equipment (UE) with a reference radio power map. To achieve this, the 3GPP protocols and functions are improved to provide open, centralized, and universal localization functions. A new reference map paradigm named Optical Radio Power Estimation using Light Analysis (ORPELA) is introduced. Real-world experiments prove that it is reproducible and more accurate than state-of-the-art radio-planning software. Machine-learning models are then designed, trained, and optimized for an ultra-challenging radio context. Finally, a large-scale experimental campaign encompassing a wide range of cases, including line-of-sight or mobility, is being conducted to demonstrate expected location performance within realistic 5G private networks.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"228 ","pages":"Article 107968"},"PeriodicalIF":4.5,"publicationDate":"2024-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142446522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart Blockchain Networks: Revolutionizing Donation Tracking in the Web 3.0 智能区块链网络:在 Web 3.0 中彻底改变捐赠追踪方式
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-09 DOI: 10.1016/j.comcom.2024.107972
Chaimaa Nairi , Murtaza Cicioğlu , Ali Çalhan
A donation-tracking system leveraging smart contracts and blockchain technology holds transformative potential for reshaping the landscape of charitable giving, especially within the context of Web 3.0. This paper explores how smart contracts and blockchain can be used to create a transparent and secure ledger for tracking charitable donations. We highlight the limitations of traditional donation systems and how a blockchain-based system can help overcome these challenges. The functionality of smart contracts in donation tracking, offering advantages such as automation, reduced transaction fees, and enhanced accountability, is elucidated. The decentralized and tamper-proof nature of blockchain technology is emphasized for increased transparency and fraud prevention. While elucidating the benefits, we also address challenges in implementing such a system, including the need for technical expertise and security considerations. By fostering trust and accountability, a donation-tracking system in Web 3.0, empowered by smart blockchain networks, aims to catalyze a profound positive impact in the realm of philanthropy.
利用智能合约和区块链技术的捐赠追踪系统具有重塑慈善捐赠格局的变革潜力,尤其是在 Web 3.0 的背景下。本文探讨了如何利用智能合约和区块链创建一个透明、安全的分类账来追踪慈善捐款。我们强调了传统捐赠系统的局限性,以及基于区块链的系统如何帮助克服这些挑战。智能合约在追踪捐赠方面的功能,提供了自动化、降低交易费用和增强问责制等优势,我们对此进行了阐述。强调了区块链技术的去中心化和防篡改特性,以提高透明度和防止欺诈。在阐释这些优势的同时,我们还探讨了实施此类系统所面临的挑战,包括对专业技术知识的需求和安全方面的考虑。通过促进信任和问责制,Web 3.0 中的捐赠追踪系统在智能区块链网络的赋能下,旨在对慈善领域产生深远的积极影响。
{"title":"Smart Blockchain Networks: Revolutionizing Donation Tracking in the Web 3.0","authors":"Chaimaa Nairi ,&nbsp;Murtaza Cicioğlu ,&nbsp;Ali Çalhan","doi":"10.1016/j.comcom.2024.107972","DOIUrl":"10.1016/j.comcom.2024.107972","url":null,"abstract":"<div><div>A donation-tracking system leveraging smart contracts and blockchain technology holds transformative potential for reshaping the landscape of charitable giving, especially within the context of Web 3.0. This paper explores how smart contracts and blockchain can be used to create a transparent and secure ledger for tracking charitable donations. We highlight the limitations of traditional donation systems and how a blockchain-based system can help overcome these challenges. The functionality of smart contracts in donation tracking, offering advantages such as automation, reduced transaction fees, and enhanced accountability, is elucidated. The decentralized and tamper-proof nature of blockchain technology is emphasized for increased transparency and fraud prevention. While elucidating the benefits, we also address challenges in implementing such a system, including the need for technical expertise and security considerations. By fostering trust and accountability, a donation-tracking system in Web 3.0, empowered by smart blockchain networks, aims to catalyze a profound positive impact in the realm of philanthropy.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"228 ","pages":"Article 107972"},"PeriodicalIF":4.5,"publicationDate":"2024-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142423339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NFTs for accessing, monetizing, and teleporting digital twins and digital artifacts in the metaverse 用于在元宇宙中访问数字孪生体和数字艺术品并使之货币化和远程传送的 NFT
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-05 DOI: 10.1016/j.comcom.2024.107965
Senay A. Gebreab , Ahmad Musamih , Haya R. Hasan , Khaled Salah , Raja Jayaraman , Yousof Al Hammadi , Mohammed Omar
Digital twins and digital artifacts have become integral components of metaverse platforms, providing users with a rich, immersive, and interactive digital experience through the deployment of diverse digital twins and digital artifacts such as 3D avatars, images, and objects. To date, a significant challenge persists in the lack of practical mechanisms to enable seamless teleportation and cross-metaverse interoperability for these digital twins and digital artifacts. There is also a lack of trusted monetization methods that facilitate trading and leasing of digital twins and digital artifacts. To address these important challenges, this paper proposes a blockchain and Non-Fungible Token (NFT)-based solution that facilitates the integration and teleportation of these digital twins and digital artifacts by providing trusted metadata, verifying ownership, and ensuring the authenticity of digital creations in the virtual world. Key to our solution is the introduction of a bridging mechanism that enables cross-metaverse interoperability, allowing for the portable transfer of NFTs across decentralized metaverse platforms. In addition, our solution focuses on empowering original digital creators by enabling the monetization of their creations through the ownership management capabilities offered by NFTs. To reliably and securely store the metadata and content of tokenized digital twins and digital artifacts, we integrate into our solution the Interplanetary File System (IPFS), a decentralized storage system. To demonstrate the feasibility of our solution, we have developed and deployed all necessary smart contracts that govern the main functionalities and interactions of the proposed system on the Ethereum Goerli Testnet. We present our proposed system architecture, accompanied by informative sequence diagrams, algorithms, and testing details. We discuss how our proposed solution attains the main objectives outlined in the paper. We evaluate our proposed solution in terms of cost and security. We have made the complete source code of our smart contracts publicly available on GitHub.
数字孪生体和数字人工制品已成为元宇宙平台不可或缺的组成部分,通过部署不同的数字孪生体和数字人工制品(如三维头像、图像和物体),为用户提供丰富的、身临其境的交互式数字体验。迄今为止,一个重大挑战依然存在,那就是缺乏实用机制来实现这些数字孪生体和数字人工制品的无缝传送和跨超时空互操作性。此外,还缺乏可信的货币化方法来促进数字孪生和数字人工制品的交易和租赁。为了应对这些重要挑战,本文提出了一种基于区块链和不可篡改代币(NFT)的解决方案,通过提供可信元数据、验证所有权和确保虚拟世界中数字创作的真实性,促进这些数字孪生体和数字艺术品的整合和远程传输。我们的解决方案的关键在于引入一种桥接机制,实现跨元宇宙的互操作性,允许在去中心化的元宇宙平台上可移植地传输 NFT。此外,我们的解决方案还注重通过 NFT 提供的所有权管理功能实现创作货币化,从而增强数字原创作者的能力。为了可靠、安全地存储标记化数字孪生和数字艺术品的元数据和内容,我们在解决方案中集成了星际文件系统(IPFS),这是一种去中心化存储系统。为了证明我们解决方案的可行性,我们在以太坊 Goerli Testnet 上开发并部署了所有必要的智能合约,以管理拟议系统的主要功能和交互。我们介绍了我们提出的系统架构,并附有翔实的序列图、算法和测试细节。我们将讨论我们提出的解决方案如何实现本文概述的主要目标。我们从成本和安全性方面评估了我们提出的解决方案。我们在 GitHub 上公开了智能合约的完整源代码。
{"title":"NFTs for accessing, monetizing, and teleporting digital twins and digital artifacts in the metaverse","authors":"Senay A. Gebreab ,&nbsp;Ahmad Musamih ,&nbsp;Haya R. Hasan ,&nbsp;Khaled Salah ,&nbsp;Raja Jayaraman ,&nbsp;Yousof Al Hammadi ,&nbsp;Mohammed Omar","doi":"10.1016/j.comcom.2024.107965","DOIUrl":"10.1016/j.comcom.2024.107965","url":null,"abstract":"<div><div>Digital twins and digital artifacts have become integral components of metaverse platforms, providing users with a rich, immersive, and interactive digital experience through the deployment of diverse digital twins and digital artifacts such as 3D avatars, images, and objects. To date, a significant challenge persists in the lack of practical mechanisms to enable seamless teleportation and cross-metaverse interoperability for these digital twins and digital artifacts. There is also a lack of trusted monetization methods that facilitate trading and leasing of digital twins and digital artifacts. To address these important challenges, this paper proposes a blockchain and Non-Fungible Token (NFT)-based solution that facilitates the integration and teleportation of these digital twins and digital artifacts by providing trusted metadata, verifying ownership, and ensuring the authenticity of digital creations in the virtual world. Key to our solution is the introduction of a bridging mechanism that enables cross-metaverse interoperability, allowing for the portable transfer of NFTs across decentralized metaverse platforms. In addition, our solution focuses on empowering original digital creators by enabling the monetization of their creations through the ownership management capabilities offered by NFTs. To reliably and securely store the metadata and content of tokenized digital twins and digital artifacts, we integrate into our solution the Interplanetary File System (IPFS), a decentralized storage system. To demonstrate the feasibility of our solution, we have developed and deployed all necessary smart contracts that govern the main functionalities and interactions of the proposed system on the Ethereum Goerli Testnet. We present our proposed system architecture, accompanied by informative sequence diagrams, algorithms, and testing details. We discuss how our proposed solution attains the main objectives outlined in the paper. We evaluate our proposed solution in terms of cost and security. We have made the complete source code of our smart contracts publicly available on GitHub.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"228 ","pages":"Article 107965"},"PeriodicalIF":4.5,"publicationDate":"2024-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142423341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization of the age of correlated information in V2X networks with edge computing 利用边缘计算优化 V2X 网络中的相关信息时代
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-03 DOI: 10.1016/j.comcom.2024.107970
Jian Wang , Tengfei Cao , Xingyan Chen , Xiaoying Wang
Vehicle-to-Everything (V2X) communication has the potential to revolutionize the travel experience in intelligent transportation, which has received the great attention recently. However, ensuring the freshness of information from multiple sources is critical for the real-time and reliable communication in vehicular networks, especially for timely updates of service centers. To address this issue, we use a promising metric called Age of Correlated Information (AoCI), which can characterize the freshness of multi-source information. Therefore, we propose a novel model that can dynamically regulate the channel activation matching and edge computing collaboration strategy to minimize AoCI in V2X vehicular networks. Firstly, we describe the system model of a V2X network with edge computing, including definitions and assumptions for freshness of information, edge co-computing, etc. Secondly, we formulate the joint optimization problem as a source-related age minimization (SRAM) problem, which is NP-complete. A heuristic algorithm is proposed to solve it under fast-fading channel. Finally, since traditional graph models cannot capture the changing correlation between nodes in dynamic networks, we use graph convolutional networks(GCN) to extract the features of multi-source correlation. The features extracted by GCN include relevant attributes of the sources and its communication links. The features are provided as input to a double deep Q network (DDQN) for training the model that can adapt to a dynamic network environment. Extensive simulation experiments in different network scenarios validate that our proposed method can effectively and efficiently reduce the average AoCI and the computational resources.
车对物(V2X)通信有望彻底改变智能交通领域的出行体验,近来备受关注。然而,要在车载网络中实现实时可靠的通信,尤其是及时更新服务中心的信息,确保来自多个来源的信息的新鲜度至关重要。为了解决这个问题,我们使用了一种很有前途的指标,即相关信息年龄(AoCI),它可以表征多源信息的新鲜度。因此,我们提出了一个新模型,可以动态调节信道激活匹配和边缘计算协作策略,以最大限度地减少 V2X 车辆网络中的 AoCI。首先,我们描述了带有边缘计算的 V2X 网络系统模型,包括信息新鲜度、边缘协同计算等的定义和假设。其次,我们将联合优化问题表述为源相关年龄最小化(SRAM)问题,这是一个 NP-完全问题。我们提出了一种启发式算法来解决快速衰落信道下的问题。最后,由于传统图模型无法捕捉动态网络中节点间不断变化的相关性,我们使用图卷积网络(GCN)来提取多源相关性特征。GCN 提取的特征包括来源及其通信链路的相关属性。这些特征将作为双深度 Q 网络(DDQN)的输入,用于训练适应动态网络环境的模型。在不同网络场景下进行的大量模拟实验验证了我们提出的方法可以有效地降低平均 AoCI,减少计算资源。
{"title":"Optimization of the age of correlated information in V2X networks with edge computing","authors":"Jian Wang ,&nbsp;Tengfei Cao ,&nbsp;Xingyan Chen ,&nbsp;Xiaoying Wang","doi":"10.1016/j.comcom.2024.107970","DOIUrl":"10.1016/j.comcom.2024.107970","url":null,"abstract":"<div><div>Vehicle-to-Everything (V2X) communication has the potential to revolutionize the travel experience in intelligent transportation, which has received the great attention recently. However, ensuring the freshness of information from multiple sources is critical for the real-time and reliable communication in vehicular networks, especially for timely updates of service centers. To address this issue, we use a promising metric called Age of Correlated Information (AoCI), which can characterize the freshness of multi-source information. Therefore, we propose a novel model that can dynamically regulate the channel activation matching and edge computing collaboration strategy to minimize AoCI in V2X vehicular networks. Firstly, we describe the system model of a V2X network with edge computing, including definitions and assumptions for freshness of information, edge co-computing, etc. Secondly, we formulate the joint optimization problem as a source-related age minimization (SRAM) problem, which is NP-complete. A heuristic algorithm is proposed to solve it under fast-fading channel. Finally, since traditional graph models cannot capture the changing correlation between nodes in dynamic networks, we use graph convolutional networks(GCN) to extract the features of multi-source correlation. The features extracted by GCN include relevant attributes of the sources and its communication links. The features are provided as input to a double deep Q network (DDQN) for training the model that can adapt to a dynamic network environment. Extensive simulation experiments in different network scenarios validate that our proposed method can effectively and efficiently reduce the average AoCI and the computational resources.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"228 ","pages":"Article 107970"},"PeriodicalIF":4.5,"publicationDate":"2024-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142442243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An on-demand collaborative edge caching strategy for edge–fog–cloud environment 针对边缘-雾-云环境的按需协作边缘缓存策略
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-03 DOI: 10.1016/j.comcom.2024.107967
Shimin Sun , Jinqi Dong , Ze Wang , Xiangyun Liu , Li Han
In this paper, we tackle the critical challenges of content edge caching, such as limited storage capacity, content popularity prediction, dynamic user demand, and user privacy, issues that most existing studies only address partially. We present an innovative Genetic Algorithm-based On-demand Collaborative Edge Caching mechanism (GAOCEC), which introduces a multi-tiered caching architecture integrating cloud, fog, and edge computing. To enhance caching efficiency and minimize system cost, a novel on-demand caching quota mechanism is proposed that dynamically allocates cache resources to edge servers. To strengthen user privacy protection during content popularity prediction, a CNN-BiLSTM-based Federated Learning algorithm (CBFL) is presented that ensures high prediction accuracy without the need to upload local data to the cloud. We also refine the genetic algorithm for content placement by fine-tuning various parameter sets to identify the optimal balance between latency reduction and caching cost. Our experimental results validate the effectiveness of our approach, demonstrating increased cache hit rates, decreased content response times, and an overall improvement in system efficiency. This work provides a comprehensive, adaptive, and privacy-preserving solution for the edge–fog–cloud environment.
在本文中,我们将解决内容边缘缓存所面临的关键挑战,如有限的存储容量、内容流行度预测、动态用户需求和用户隐私等问题,而大多数现有研究仅部分解决了这些问题。我们提出了一种创新的基于遗传算法的按需协作边缘缓存机制(GAOCEC),该机制引入了一种整合云、雾和边缘计算的多层缓存架构。为提高缓存效率并最大限度地降低系统成本,提出了一种新颖的按需缓存配额机制,可动态地为边缘服务器分配缓存资源。为了在内容流行度预测过程中加强对用户隐私的保护,我们提出了一种基于 CNN-BiLSTM 的联合学习算法(CBFL),该算法无需将本地数据上传到云端即可确保较高的预测精度。我们还通过微调各种参数集来改进用于内容放置的遗传算法,以确定降低延迟和缓存成本之间的最佳平衡。我们的实验结果验证了我们方法的有效性,显示出缓存命中率的提高、内容响应时间的缩短以及系统效率的整体提高。这项工作为边缘雾云环境提供了一个全面、自适应和保护隐私的解决方案。
{"title":"An on-demand collaborative edge caching strategy for edge–fog–cloud environment","authors":"Shimin Sun ,&nbsp;Jinqi Dong ,&nbsp;Ze Wang ,&nbsp;Xiangyun Liu ,&nbsp;Li Han","doi":"10.1016/j.comcom.2024.107967","DOIUrl":"10.1016/j.comcom.2024.107967","url":null,"abstract":"<div><div>In this paper, we tackle the critical challenges of content edge caching, such as limited storage capacity, content popularity prediction, dynamic user demand, and user privacy, issues that most existing studies only address partially. We present an innovative Genetic Algorithm-based On-demand Collaborative Edge Caching mechanism (GAOCEC), which introduces a multi-tiered caching architecture integrating cloud, fog, and edge computing. To enhance caching efficiency and minimize system cost, a novel on-demand caching quota mechanism is proposed that dynamically allocates cache resources to edge servers. To strengthen user privacy protection during content popularity prediction, a CNN-BiLSTM-based Federated Learning algorithm (CBFL) is presented that ensures high prediction accuracy without the need to upload local data to the cloud. We also refine the genetic algorithm for content placement by fine-tuning various parameter sets to identify the optimal balance between latency reduction and caching cost. Our experimental results validate the effectiveness of our approach, demonstrating increased cache hit rates, decreased content response times, and an overall improvement in system efficiency. This work provides a comprehensive, adaptive, and privacy-preserving solution for the edge–fog–cloud environment.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"228 ","pages":"Article 107967"},"PeriodicalIF":4.5,"publicationDate":"2024-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142423338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of SR-IOV in Docker containers using RTT measurements 利用 RTT 测量分析 Docker 容器中的 SR-IOV
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-02 DOI: 10.1016/j.comcom.2024.107961
Assis T. de Oliveira Filho , Eduardo Freitas , Pedro R.X. do Carmo , Eduardo Souto , Judith Kelner , Djamel F.H. Sadok
Cloud computing, a central pillar of modern IT infrastructure, faces constant challenges in provisioning and optimizing network performance, specifically regarding low-latency communication. This study investigates the impact of Single Root I/O Virtualization (SR-IOV) as a critical Quality of Service (QoS) enabler in virtualized environments. Data plane innovative technologies for virtual servers, especially SR-IOV technology, emerged as a promising solution adopted in data centers. When combined with Peripheral Component Interconnect (PCI) Passthrough in Docker environments, SR-IOV promises significant network performance gains. Our rigorous experimental methodology demonstrates that integrating SR-IOV reduces Round-Trip Time (RTT) latency by up to 15 times compared to the traditional Linux based Bridge configuration used in Docker, without significant additional costs. This research is particularly relevant for system administrators, data center professionals, and network traffic engineers, providing them valuable information into optimizing communication in cloud computing environments. By addressing this critical gap in knowledge, our study serves as a practical guide for the effective implementation these emerging technologies for network virtualization. In terms of practical applicability, the results raise valuable insights into the performance and implications of implementing SR-IOV and PCI Passthrough in a Docker environment. As a result, more informed decisions are tailored to the specific requirements of different usage scenarios.
云计算是现代 IT 基础设施的核心支柱,在配置和优化网络性能(特别是低延迟通信)方面面临着持续的挑战。本研究探讨了单根 I/O 虚拟化(SR-IOV)作为虚拟化环境中关键的服务质量(QoS)促进因素的影响。用于虚拟服务器的数据平面创新技术,尤其是 SR-IOV 技术,已成为数据中心采用的一种前景广阔的解决方案。当与 Docker 环境中的外设组件互连(PCI)直通(Passthrough)相结合时,SR-IOV 可显著提高网络性能。我们严谨的实验方法证明,与 Docker 中使用的基于 Linux 的传统桥接器配置相比,集成 SR-IOV 可将往返时间(RTT)延迟减少多达 15 倍,而且不会增加大量成本。这项研究对系统管理员、数据中心专业人员和网络流量工程师尤为重要,为他们优化云计算环境中的通信提供了宝贵的信息。通过解决这一关键的知识空白,我们的研究为有效实施这些新兴的网络虚拟化技术提供了实用指南。在实际应用方面,研究结果对在 Docker 环境中实施 SR-IOV 和 PCI 直通的性能和影响提出了有价值的见解。因此,可以根据不同使用场景的具体要求做出更明智的决策。
{"title":"Analysis of SR-IOV in Docker containers using RTT measurements","authors":"Assis T. de Oliveira Filho ,&nbsp;Eduardo Freitas ,&nbsp;Pedro R.X. do Carmo ,&nbsp;Eduardo Souto ,&nbsp;Judith Kelner ,&nbsp;Djamel F.H. Sadok","doi":"10.1016/j.comcom.2024.107961","DOIUrl":"10.1016/j.comcom.2024.107961","url":null,"abstract":"<div><div>Cloud computing, a central pillar of modern IT infrastructure, faces constant challenges in provisioning and optimizing network performance, specifically regarding low-latency communication. This study investigates the impact of Single Root I/O Virtualization (SR-IOV) as a critical Quality of Service (QoS) enabler in virtualized environments. Data plane innovative technologies for virtual servers, especially SR-IOV technology, emerged as a promising solution adopted in data centers. When combined with Peripheral Component Interconnect (PCI) Passthrough in Docker environments, SR-IOV promises significant network performance gains. Our rigorous experimental methodology demonstrates that integrating SR-IOV reduces Round-Trip Time (RTT) latency by up to 15 times compared to the traditional Linux based Bridge configuration used in Docker, without significant additional costs. This research is particularly relevant for system administrators, data center professionals, and network traffic engineers, providing them valuable information into optimizing communication in cloud computing environments. By addressing this critical gap in knowledge, our study serves as a practical guide for the effective implementation these emerging technologies for network virtualization. In terms of practical applicability, the results raise valuable insights into the performance and implications of implementing SR-IOV and PCI Passthrough in a Docker environment. As a result, more informed decisions are tailored to the specific requirements of different usage scenarios.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"228 ","pages":"Article 107961"},"PeriodicalIF":4.5,"publicationDate":"2024-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142423337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RIPPLE-WiN: An efficient protocol for loop-free multipath routing in wireless networks RIPPLE-WiN:无线网络中无环路多径路由的高效协议
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-01 DOI: 10.1016/j.comcom.2024.107966
J.J. Garcia-Luna-Aceves , Dylan Cirimelli-Low
This paper presents a new routing protocol for wireless networks called RIPPLE-WiN (Routing Information Protocol with Probing for Looplessness and Efficiency in Wireless Networks). RIPPLE-WiN is designed to provide loop-free multipath routing in wireless networks. RIPPLE-WiN accomplishes loop-free routing by replacing destination sequence numbers used in such routing protocols as AODV and DSDV with hop references. Simulation experiments based on the ns3 simulator are used to illustrate that RIPPLE-WiN is far more efficient that OLSR, DSDV and AODV. The simulation results show that RIPPLE-WiN attains better packet delivery rates and delays than the other routing protocols in the presence of failures and mobility while incurring less signaling overhead.
本文介绍了一种新的无线网络路由协议,名为 RIPPLE-WiN(Routing Information Protocol with Probing for Looplessness and Efficiency in Wireless Networks)。RIPPLE-WiN 设计用于在无线网络中提供无环路多径路由。RIPPLE-WiN 通过用跳数引用取代 AODV 和 DSDV 等路由协议中使用的目的序列号来实现无环路由。基于 ns3 模拟器的仿真实验表明,RIPPLE-WiN 的效率远高于 OLSR、DSDV 和 AODV。仿真结果表明,在存在故障和移动性的情况下,RIPPLE-WiN 比其他路由协议能获得更好的数据包传输速率和延迟,同时产生更少的信号开销。
{"title":"RIPPLE-WiN: An efficient protocol for loop-free multipath routing in wireless networks","authors":"J.J. Garcia-Luna-Aceves ,&nbsp;Dylan Cirimelli-Low","doi":"10.1016/j.comcom.2024.107966","DOIUrl":"10.1016/j.comcom.2024.107966","url":null,"abstract":"<div><div>This paper presents a new routing protocol for wireless networks called RIPPLE-WiN (Routing Information Protocol with Probing for Looplessness and Efficiency in Wireless Networks). RIPPLE-WiN is designed to provide loop-free multipath routing in wireless networks. RIPPLE-WiN accomplishes loop-free routing by replacing destination sequence numbers used in such routing protocols as AODV and DSDV with hop references. Simulation experiments based on the ns3 simulator are used to illustrate that RIPPLE-WiN is far more efficient that OLSR, DSDV and AODV. The simulation results show that RIPPLE-WiN attains better packet delivery rates and delays than the other routing protocols in the presence of failures and mobility while incurring less signaling overhead.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"228 ","pages":"Article 107966"},"PeriodicalIF":4.5,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142423340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Virtualized network functions resource allocation in network functions virtualization using mathematical programming 使用数学编程分配网络功能虚拟化中的虚拟网络功能资源
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-30 DOI: 10.1016/j.comcom.2024.107963
Mahsa Moradi , Mahmood Ahmadi , Latif PourKarimi
Network Functions Virtualization (NFV) revolutionizes network services by eliminating the need for dedicated hardware. This virtualization enables flexible and efficient deployment of various network functions like proxies, firewalls, and load balancers. Providing the service requested by the user in the network is done by a sequence of virtual network functions, which are known as service functions chain. One of the main challenges in the development of network functions virtualization architecture is the allocation of resources to the requested network services in network infrastructures, this challenge is called network function virtualization resource allocation problem. Therefore, this paper addresses the resource allocation problem in Network Functions Virtualization (NFV) architectures using mathematical programming techniques. A multi-objective mixed-integer linear programming (MILP) model is proposed to optimize resource allocation for virtual network functions (VNFs). The model incorporates constraints related to node and link resource capacities, as well as delay requirements. The objective functions focus on maximizing network throughput, minimizing node resource costs (CPU cores and memory), reducing capital and operational expenses, and ensuring efficient execution time. These constraints and objective functions are formally defined by mathematical functions. The proposed mathematical model is implemented and solved using the Cplex solver. To evaluate the effectiveness of the proposed mathematical model, various network topologies were evaluated under different parameters. These parameters included the length of Service Function Chains (SFCs), the number and length of flows, node resource capacities, the number of nodes and VNFs. The experimental results demonstrated the model’s ability to efficiently allocate resources to VNFs across these different scenarios.
网络功能虚拟化(NFV)通过消除对专用硬件的需求,彻底改变了网络服务。这种虚拟化可以灵活高效地部署代理、防火墙和负载平衡器等各种网络功能。用户在网络中要求的服务由一系列虚拟网络功能完成,这些功能被称为服务功能链。开发网络功能虚拟化架构的主要挑战之一是如何在网络基础设施中为所请求的网络服务分配资源,这一挑战被称为网络功能虚拟化资源分配问题。因此,本文利用数学编程技术来解决网络功能虚拟化(NFV)架构中的资源分配问题。本文提出了一个多目标混合整数线性规划(MILP)模型,用于优化虚拟网络功能(VNF)的资源分配。该模型包含与节点和链路资源容量以及延迟要求相关的约束条件。目标函数侧重于最大化网络吞吐量、最小化节点资源成本(CPU 内核和内存)、降低资本和运营费用,以及确保高效的执行时间。这些约束条件和目标函数由数学函数正式定义。提出的数学模型使用 Cplex 求解器实现和求解。为评估所提数学模型的有效性,对不同参数下的各种网络拓扑结构进行了评估。这些参数包括服务功能链(SFC)的长度、流量的数量和长度、节点资源容量、节点和 VNF 的数量。实验结果表明,该模型能够在这些不同场景下为 VNF 有效分配资源。
{"title":"Virtualized network functions resource allocation in network functions virtualization using mathematical programming","authors":"Mahsa Moradi ,&nbsp;Mahmood Ahmadi ,&nbsp;Latif PourKarimi","doi":"10.1016/j.comcom.2024.107963","DOIUrl":"10.1016/j.comcom.2024.107963","url":null,"abstract":"<div><div>Network Functions Virtualization (NFV) revolutionizes network services by eliminating the need for dedicated hardware. This virtualization enables flexible and efficient deployment of various network functions like proxies, firewalls, and load balancers. Providing the service requested by the user in the network is done by a sequence of virtual network functions, which are known as service functions chain. One of the main challenges in the development of network functions virtualization architecture is the allocation of resources to the requested network services in network infrastructures, this challenge is called network function virtualization resource allocation problem. Therefore, this paper addresses the resource allocation problem in Network Functions Virtualization (NFV) architectures using mathematical programming techniques. A multi-objective mixed-integer linear programming (MILP) model is proposed to optimize resource allocation for virtual network functions (VNFs). The model incorporates constraints related to node and link resource capacities, as well as delay requirements. The objective functions focus on maximizing network throughput, minimizing node resource costs (CPU cores and memory), reducing capital and operational expenses, and ensuring efficient execution time. These constraints and objective functions are formally defined by mathematical functions. The proposed mathematical model is implemented and solved using the Cplex solver. To evaluate the effectiveness of the proposed mathematical model, various network topologies were evaluated under different parameters. These parameters included the length of Service Function Chains (SFCs), the number and length of flows, node resource capacities, the number of nodes and VNFs. The experimental results demonstrated the model’s ability to efficiently allocate resources to VNFs across these different scenarios.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"228 ","pages":"Article 107963"},"PeriodicalIF":4.5,"publicationDate":"2024-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142423334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Federated learning: A cutting-edge survey of the latest advancements and applications 联合学习:最新进展和应用的前沿调查
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-30 DOI: 10.1016/j.comcom.2024.107964
Azim Akhtarshenas , Mohammad Ali Vahedifar , Navid Ayoobi , Behrouz Maham , Tohid Alizadeh , Sina Ebrahimi , David López-Pérez
Robust machine learning (ML) models can be developed by leveraging large volumes of data and distributing the computational tasks across numerous devices or servers. Federated learning (FL) is a technique in the realm of ML that facilitates this goal by utilizing cloud infrastructure to enable collaborative model training among a network of decentralized devices. Beyond distributing the computational load, FL targets the resolution of privacy issues and the reduction of communication costs simultaneously. To protect user privacy, FL requires users to send model updates rather than transmitting large quantities of raw and potentially confidential data. Specifically, individuals train ML models locally using their own data and then upload the results in the form of weights and gradients to the cloud for aggregation into the global model. This strategy is also advantageous in environments with limited bandwidth or high communication costs, as it prevents the transmission of large data volumes. With the increasing volume of data and rising privacy concerns, alongside the emergence of large-scale ML models like Large Language Models (LLMs), FL presents itself as a timely and relevant solution. It is therefore essential to review current FL algorithms to guide future research that meets the rapidly evolving ML demands. This survey provides a comprehensive analysis and comparison of the most recent FL algorithms, evaluating them on various fronts including mathematical frameworks, privacy protection, resource allocation, and applications. Beyond summarizing existing FL methods, this survey identifies potential gaps, open areas, and future challenges based on the performance reports and algorithms used in recent studies. This survey enables researchers to readily identify existing limitations in the FL field for further exploration.
利用大量数据并将计算任务分配给众多设备或服务器,可以开发出强大的机器学习(ML)模型。联合学习(FL)是机器学习领域的一项技术,它利用云基础设施在分散的设备网络之间实现协作模型训练,从而促进这一目标的实现。除了分散计算负荷,FL 还能同时解决隐私问题和降低通信成本。为了保护用户隐私,FL 要求用户发送模型更新,而不是传输大量原始和潜在的机密数据。具体来说,个人使用自己的数据在本地训练 ML 模型,然后将结果以权重和梯度的形式上传到云端,汇总到全局模型中。这种策略在带宽有限或通信成本较高的环境中也很有优势,因为它可以避免传输大量数据。随着数据量的不断增加和对隐私问题的日益关注,以及大型语言模型(LLM)等大规模 ML 模型的出现,FL 成为了一种适时的相关解决方案。因此,有必要对当前的 FL 算法进行审查,以指导未来的研究,满足快速发展的 ML 需求。本调查报告全面分析和比较了最新的 FL 算法,从数学框架、隐私保护、资源分配和应用等多个方面对其进行了评估。除了总结现有的 FL 方法,本调查还根据最近研究中使用的性能报告和算法,确定了潜在的差距、开放领域和未来挑战。这项调查使研究人员能够随时发现 FL 领域现有的局限性,以便进一步探索。
{"title":"Federated learning: A cutting-edge survey of the latest advancements and applications","authors":"Azim Akhtarshenas ,&nbsp;Mohammad Ali Vahedifar ,&nbsp;Navid Ayoobi ,&nbsp;Behrouz Maham ,&nbsp;Tohid Alizadeh ,&nbsp;Sina Ebrahimi ,&nbsp;David López-Pérez","doi":"10.1016/j.comcom.2024.107964","DOIUrl":"10.1016/j.comcom.2024.107964","url":null,"abstract":"<div><div>Robust machine learning (ML) models can be developed by leveraging large volumes of data and distributing the computational tasks across numerous devices or servers. Federated learning (FL) is a technique in the realm of ML that facilitates this goal by utilizing cloud infrastructure to enable collaborative model training among a network of decentralized devices. Beyond distributing the computational load, FL targets the resolution of privacy issues and the reduction of communication costs simultaneously. To protect user privacy, FL requires users to send model updates rather than transmitting large quantities of raw and potentially confidential data. Specifically, individuals train ML models locally using their own data and then upload the results in the form of weights and gradients to the cloud for aggregation into the global model. This strategy is also advantageous in environments with limited bandwidth or high communication costs, as it prevents the transmission of large data volumes. With the increasing volume of data and rising privacy concerns, alongside the emergence of large-scale ML models like Large Language Models (LLMs), FL presents itself as a timely and relevant solution. It is therefore essential to review current FL algorithms to guide future research that meets the rapidly evolving ML demands. This survey provides a comprehensive analysis and comparison of the most recent FL algorithms, evaluating them on various fronts including mathematical frameworks, privacy protection, resource allocation, and applications. Beyond summarizing existing FL methods, this survey identifies potential gaps, open areas, and future challenges based on the performance reports and algorithms used in recent studies. This survey enables researchers to readily identify existing limitations in the FL field for further exploration.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"228 ","pages":"Article 107964"},"PeriodicalIF":4.5,"publicationDate":"2024-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142423335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A heterogeneous ring signcryption scheme with privacy protection and conditional tracing for smart grid 用于智能电网的具有隐私保护和条件追踪功能的异构环形签名加密方案
IF 4.5 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-26 DOI: 10.1016/j.comcom.2024.107959
Xinhuang Zhou , Ming Luo , Minrong Qiu
Smart grid develops rapidly, but there are still security risks such as user privacy leakage, power data tampering and audit data inconsistency. The existing schemes to ensure data security mainly use traceable ring signcryption, which is applied in distributed application scenarios such as smart grid. Traceable ring signcryption can ensure the anonymity, integrity, unforgeability and confidentiality of data, and can trace the real identity of anonymous users. However, the traceability of these schemes is arbitrary, any actor can trace the identity of anonymous users, and they do not resolve disputes caused by tampered or inconsistent data. To remedy these deficiencies, we combine ring signcryption with consortium blockchain technology for the first time to achieve privacy protection and conditional tracing, which can effectively avoid anonymous user identity being revealed at will. Consortium blockchain is a semi-distributed P2P network that can solve data disputes and is suitable for organizations that require certain access control mechanisms such as smart grid. In this paper, we propose a heterogeneous ring signcryption scheme with privacy protection and conditional tracing (CTHRSC) which between certificateless cryptographic system (CLC) and public key infrastructure (PKI). Besides, we prove that our scheme is secure under the discrete logarithm problem (DLP) and decisional Diffie–Hellman problem (DDHP) in random oracle model (ROM). Compared with other signature or signcryption schemes, our advantages are satisfying conditional tracing and known temporary session key security (KTSKS), requiring less computation cost and communication overhead.
智能电网发展迅速,但仍存在用户隐私泄露、电力数据篡改、审计数据不一致等安全隐患。现有确保数据安全的方案主要采用可溯源环形签名加密技术,应用于智能电网等分布式应用场景。可溯源环形签名加密技术可以确保数据的匿名性、完整性、不可伪造性和保密性,并可追溯匿名用户的真实身份。然而,这些方案的可追溯性是任意的,任何行为者都可以追踪匿名用户的身份,而且无法解决因数据被篡改或不一致而引起的争议。为了弥补这些不足,我们首次将环形签名加密与联盟区块链技术相结合,实现了隐私保护和有条件追踪,可以有效避免匿名用户身份被随意泄露。联盟区块链是一种半分布式的P2P网络,可以解决数据纠纷,适用于智能电网等需要一定访问控制机制的组织。本文提出了一种介于无证书加密系统(CLC)和公钥基础设施(PKI)之间的具有隐私保护和条件追踪功能的异构环形签名加密方案(CTHRSC)。此外,我们还证明了我们的方案在随机甲骨文模型(ROM)中的离散对数问题(DLP)和决策迪菲-赫尔曼问题(DDHP)下是安全的。与其他签名或签名加密方案相比,我们的优势在于满足条件追踪和已知临时会话密钥安全(KTSKS),所需的计算成本和通信开销较少。
{"title":"A heterogeneous ring signcryption scheme with privacy protection and conditional tracing for smart grid","authors":"Xinhuang Zhou ,&nbsp;Ming Luo ,&nbsp;Minrong Qiu","doi":"10.1016/j.comcom.2024.107959","DOIUrl":"10.1016/j.comcom.2024.107959","url":null,"abstract":"<div><div>Smart grid develops rapidly, but there are still security risks such as user privacy leakage, power data tampering and audit data inconsistency. The existing schemes to ensure data security mainly use traceable ring signcryption, which is applied in distributed application scenarios such as smart grid. Traceable ring signcryption can ensure the anonymity, integrity, unforgeability and confidentiality of data, and can trace the real identity of anonymous users. However, the traceability of these schemes is arbitrary, any actor can trace the identity of anonymous users, and they do not resolve disputes caused by tampered or inconsistent data. To remedy these deficiencies, we combine ring signcryption with consortium blockchain technology for the first time to achieve privacy protection and conditional tracing, which can effectively avoid anonymous user identity being revealed at will. Consortium blockchain is a semi-distributed P2P network that can solve data disputes and is suitable for organizations that require certain access control mechanisms such as smart grid. In this paper, we propose a heterogeneous ring signcryption scheme with privacy protection and conditional tracing (CTHRSC) which between certificateless cryptographic system (CLC) and public key infrastructure (PKI). Besides, we prove that our scheme is secure under the discrete logarithm problem (DLP) and decisional Diffie–Hellman problem (DDHP) in random oracle model (ROM). Compared with other signature or signcryption schemes, our advantages are satisfying conditional tracing and known temporary session key security (KTSKS), requiring less computation cost and communication overhead.</div></div>","PeriodicalId":55224,"journal":{"name":"Computer Communications","volume":"228 ","pages":"Article 107959"},"PeriodicalIF":4.5,"publicationDate":"2024-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142423336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1