期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Algorithm for complex network diameter based on distance matrix 被引量:5
1
作者 CHEN Bin ZHU Weixing LIU Ying 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2018年第2期336-342,共7页
The network diameter is an important characteristic parameter of a complex network. Calculation for a large-scale complex network’s diameter has been an important subject in the study of complex networks. If the netw... The network diameter is an important characteristic parameter of a complex network. Calculation for a large-scale complex network’s diameter has been an important subject in the study of complex networks. If the network diameter is calculated directly, the problem mainly exists in efficiency for searching and counting the shortest paths. If the network diameter is calculated indirectly by studying the statistical function about the relationship between the network diameter and parameters affecting the diameter, the problems not only exist in the efficiency of statistic, but also exist in the function which may be not applicable to all kinds of networks. An algorithm for the complex network diameter based on the k order distance matrix is proposed with a matrix multiplication approach, and a mathematical proof for the algorithm correctness is given as well. Furthermore, some relevant propositions and deductions for reducing the complexity of this algorithm are put forward. With a good theoretical basis and a simple calculation process, this algorithm can be used to calculate the diameter of a large-scale complex network with small-world effect more accurately and efficiently. Two cases about the advanced research projects agency(ARPA) network model and the Chinese airline network model are adopted to verify the effect of this algorithm. 展开更多
关键词 complex network network diameter distance matrix
在线阅读 下载PDF
Confidentiality-aware message scheduling for security-critical wireless networks 被引量:1
2
作者 Wei Jiang Guangze Xiong Xuyang Ding Zhengwei Chang Nan Sang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2010年第1期154-160,共7页
Without considering security, existing message scheduling mechanisms may expose critical messages to malicious threats like confidentiality attacks. Incorporating confidentiality improvement into message scheduling, t... Without considering security, existing message scheduling mechanisms may expose critical messages to malicious threats like confidentiality attacks. Incorporating confidentiality improvement into message scheduling, this paper investigates the problem of scheduling aperiodc messages with time-critical and security-critical requirements. A risk-based security profit model is built to quantify the security quality of messages; and a dynamic programming based approximation algorithm is proposed to schedule aperiodic messages with guaranteed security performance. Experimental results illustrate the efficiency and effectiveness of the proposed algorithm. 展开更多
关键词 security-critical wireless networks confidentialityaware REAL-TIME message scheduling.
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部