期刊文献+
共找到982篇文章
< 1 2 50 >
每页显示 20 50 100
TCLOUD: A New Model of Data Storage Providing Public Verifiability and Dynamic Data Recovery for Cloud Computing
1
作者 Sultan Ullah Xuefeng Zheng Feng Zhou 《Journal of Software Engineering and Applications》 2013年第3期23-28,共6页
Cloud computing is a new paradigm of computing and is considered to be the next generation of information technology infrastructure for an enterprise. The distributed architecture of cloud data storage facilitates the... Cloud computing is a new paradigm of computing and is considered to be the next generation of information technology infrastructure for an enterprise. The distributed architecture of cloud data storage facilitates the customer to get benefits from the greater quality of storage and minimized the operating cost. This technology also brought numerous possible threats including data confidentiality, integrity and availability. A homomorphic based model of storage is proposed, which enable the customer and a third party auditor to perform the authentication of data stored on the cloud storage. This model performs the verification of huge file’s integrity and availability with less consumption of computation, storage and communication resources. The proposed model also supports public verifiability and dynamic data recovery. 展开更多
关键词 Data storage INTEGRITY CONFIDENTIALITY CLOUD computing
在线阅读 下载PDF
HUSTserver:Implementation for Reliable and High-Performance Network Attached Storage System 被引量:2
2
作者 郭辉 周敬利 余胜生 《Journal of Shanghai University(English Edition)》 CAS 2003年第2期156-162,共7页
Network attached storage (NAS) with the properties of improved scalability, simplified management, low cost and balanced price performance, is desirable for high performance storage systems applied to extensive area... Network attached storage (NAS) with the properties of improved scalability, simplified management, low cost and balanced price performance, is desirable for high performance storage systems applied to extensive areas. Unfortunately, it also has some disadvantages such as increased network workload, and inconvenience in disaster recovery. To overcome these disadvantages, we propose a channel bonding technique and provide hot backup functions in the designed NAS system, named HUSTserver. Channel bonding means merging multiple Ethernet channels into integrated one, and that the data packets can be transferred through any available network channels in a parallel mode. The hot backup function provides automatic data mirroring among servers. In this paper, we first describe the whole system prototype from a software and hardware architecture view. Then, multiple Ethernet and hot backup technologies that distinguish HUSTserver from others are discussed in detail. The findings presented demonstrate that network bandwidth can be scaled by the use of multiple commodity networks. Dual parallel channels of commodity 100 Mbps Ethernet are both necessary and sufficient to support the data rates of multiple concurrent file transfers. And the hot backup function introduced in our system provides high data accessibility. 展开更多
关键词 storage systems network attached storage computer network channel bonding data mirroring.
在线阅读 下载PDF
Structural knowledge-driven meta-learning for task offloading in vehicular networks with integrated communications,sensing and computing
3
作者 Ruijin Sun Yao Wen +3 位作者 Nan Cheng Wei Wang Rong Chai Yilong Hui 《Journal of Information and Intelligence》 2024年第4期302-324,共23页
Task offloading is a potential solution to satisfy the strict requirements of computation-intensive and latency-sensitive vehicular applications due to the limited onboard computing resources.However,the overwhelming ... Task offloading is a potential solution to satisfy the strict requirements of computation-intensive and latency-sensitive vehicular applications due to the limited onboard computing resources.However,the overwhelming upload traffic may lead to unacceptable uploading time.To tackle this issue,for tasks taking environmental data as input,the data perceived by roadside units(RSU)equipped with several sensors can be directly exploited for computation,resulting in a novel task offloading paradigm with integrated communications,sensing and computing(I-CSC).With this paradigm,vehicles can select to upload their sensed data to RSUs or transmit computing instructions to RSUs during the offloading.By optimizing the computation mode and network resources,in this paper,we investigate an I-CSC-based task offloading problem to reduce the cost caused by resource consumption while guaranteeing the latency of each task.Although this nonconvex problem can be handled by the alternating minimization(AM)algorithm that alternatively minimizes the divided four sub-problems,it leads to high computational complexity and local optimal solution.To tackle this challenge,we propose a creative structural knowledge-driven meta-learning(SKDML)method,involving both the model-based AM algorithm and neural networks.Specifically,borrowing the iterative structure of the AM algorithm,also referred to as structural knowledge,the proposed SKDML adopts long short-term memory(LSTM)networkbased meta-learning to learn an adaptive optimizer for updating variables in each sub-problem,instead of the handcrafted counterpart in the AM algorithm.Furthermore,to pull out the solution from the local optimum,our proposed SKDML updates parameters in LSTM with the global loss function.Simulation results demonstrate that our method outperforms both the AM algorithm and the meta-learning without structural knowledge in terms of both the online processing time and the network performance. 展开更多
关键词 Knowledge-driven meta-learning integration of communication Sensing and computing Task offloading Vehicular networks
原文传递
Enable Data Dynamics for Algebraic Signatures Based Remote Data Possession Checking in the Cloud Storage 被引量:4
4
作者 LUO Yuchuan FU Shaojing +1 位作者 XU Ming WANG Dongsheng 《China Communications》 SCIE CSCD 2014年第11期114-124,共11页
Cloud storage is one of the main application of the cloud computing.With the data services in the cloud,users is able to outsource their data to the cloud,access and share their outsourced data from the cloud server a... Cloud storage is one of the main application of the cloud computing.With the data services in the cloud,users is able to outsource their data to the cloud,access and share their outsourced data from the cloud server anywhere and anytime.However,this new paradigm of data outsourcing services also introduces new security challenges,among which is how to ensure the integrity of the outsourced data.Although the cloud storage providers commit a reliable and secure environment to users,the integrity of data can still be damaged owing to the carelessness of humans and failures of hardwares/softwares or the attacks from external adversaries.Therefore,it is of great importance for users to audit the integrity of their data outsourced to the cloud.In this paper,we first design an auditing framework for cloud storage and proposed an algebraic signature based remote data possession checking protocol,which allows a third-party to auditing the integrity of the outsourced data on behalf of the users and supports unlimited number of verifications.Then we extends our auditing protocol to support data dynamic operations,including data update,data insertion and data deletion.The analysis and experiment results demonstrate that our proposed schemes are secure and efficient. 展开更多
关键词 cloud computing cloud storage data integrity algebraic signatures datadynamics
在线阅读 下载PDF
Critical Factors for Personal Cloud Storage Adoption in China 被引量:1
5
作者 Jianya WANG 《Journal of Data and Information Science》 2016年第2期60-74,共15页
Purpose: In order to explain and predict the adoption of personal cloud storage, this study explores the critical factors involved in the adoption of personal cloud storage and empirically validates their relationshi... Purpose: In order to explain and predict the adoption of personal cloud storage, this study explores the critical factors involved in the adoption of personal cloud storage and empirically validates their relationships to a user's intentions.Design/methodology/approach: Based on technology acceptance model(TAM), network externality, trust, and an interview survey, this study proposes a personal cloud storage adoption model. We conducted an empirical analysis by structural equation modeling based on survey data obtained with a questionnaire.Findings: Among the adoption factors we identified, network externality has the salient influence on a user's adoption intention, followed by perceived usefulness, individual innovation, perceived trust, perceived ease of use, and subjective norms. Cloud storage characteristics are the most important indirect factors, followed by awareness to personal cloud storage and perceived risk. However, although perceived risk is regarded as an important factor by other cloud computing researchers, we found that it has no significant influence. Also, subjective norms have no significant influence on perceived usefulness. This indicates that users are rational when they choose whether to adopt personal cloud storage.Research limitations: This study ignores time and cost factors that might affect a user's intention to adopt personal cloud storage.Practical implications: Our findings might be helpful in designing and developing personal cloud storage products, and helpful to regulators crafting policies.Originality/value: This study is one of the first research efforts that discuss Chinese users' personal cloud storage adoption, which should help to further the understanding of personal cloud adoption behavior among Chinese users. 展开更多
关键词 Adoption behavior Behavior intention Personal cloud storage Personalinfbrmation management Cloud computing network externality Technology acceptancemodel (TAM) Personal innovativeness
在线阅读 下载PDF
An Improved Scheduling Algorithm for Cloud Storage
6
作者 Zhongwen Gao Zhou Shao +2 位作者 Kai Zhang Wenzhi Wu Weiwei Song 《通讯和计算机(中英文版)》 2013年第2期202-206,共5页
关键词 存储模型 调度算法 风险成本 经济成本 存储时间 成本计量 基于模型
在线阅读 下载PDF
Lightweight and Compromise Resilient Storage Outsourcing with Distributed Secure Accessibility in Mobile Cloud Computing 被引量:3
7
作者 Wei Ren Linchen Yu +1 位作者 Ren Gao Feng Xiong 《Tsinghua Science and Technology》 SCIE EI CAS 2011年第5期520-528,共9页
Mobile Cloud Computing usually consists of front-end users who possess mobile devices and back-end cloud servers. This paradigm empowers users to pervasively access a large volume of storage resources with portable de... Mobile Cloud Computing usually consists of front-end users who possess mobile devices and back-end cloud servers. This paradigm empowers users to pervasively access a large volume of storage resources with portable devices in a distributed and cooperative manner. During the period between uploading and downloading files (data), the privacy and integrity of files need to be guaranteed. To this end, a family of schemes are proposed for different situations. All schemes are lightweight in terms of computational overhead, resilient to storage compromise on mobile devices, and do not assume that trusted cloud servers are present. Corresponding algorithms are proposed in detail for guiding off-the-shelf implementation. The evaluation of security and performance is also extensively analyzed, justifying the applicability of the proposed schemes. 展开更多
关键词 mobile cloud computing PRIVACY INTEGRITY storage security
原文传递
A simultaneous approach for integration of thermal energy storages in industrial processes using multiperiod heat integration
8
作者 Simon Möhren Christian Schäfer +1 位作者 Jörg Meyer Hartmut Krause 《Energy Storage and Saving》 2022年第2期117-128,共12页
In times of increasing global warming,enormous efforts are required to rapidly reduce greenhouse gas(GHG)emissions.Due to the EU’s target of climate neutrality by 2050 and the even more ambitious goal of becoming cli... In times of increasing global warming,enormous efforts are required to rapidly reduce greenhouse gas(GHG)emissions.Due to the EU’s target of climate neutrality by 2050 and the even more ambitious goal of becoming climate-neutral in Germany by 2045,it is necessary to systematically increase energy efficiency and decarbonize the industrial heat sector.The methods of heat integration can be used to exploit existing potentials for waste heat utilization and to integrate renewable technologies for heating and cooling.By using a non-stationary,multiperiod approach,additional energy savings can be achieved by integrating a thermal energy storage(TES)that enables heat transportation over time.This paper presents a simultaneous approach for thermal energy storage integration into multiperiod heat integration problems.The approach can be used to minimize energy demand,costs and CO 2 emissions and is demonstrated in two case studies.In case study 1,it is shown that the presented approach is capable of integrating a TES properly into a simple multiperiod heat integration problem with two periods.In case study 2,a simplified example from a cosmetics manufactory is investigated.The total utility demand can be reduced by up to 44.3%due to TES integration and the energetic optimal storage size can be determined as 125 m 3.The savings are strongly dependent on the constellation of heat flows between the periods,on the temperature levels and on the storage size.Significant reductions of energy demand,costs and CO 2 emissions can be achieved with TES being properly integrated into a suitable operating environment. 展开更多
关键词 Multiperiod heat integration Thermal energy storage Waste heat utilization Heat exchanger network Energy efficiency
原文传递
A Novel Transparent and Auditable Fog-Assisted Cloud Storage with Compensation Mechanism 被引量:2
9
作者 Donghyun Kim Junggab Son +3 位作者 Daehee Seo Yeojin Kim Hyobin Kim Jung Taek Seo 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2020年第1期28-43,共16页
This paper introduces a new fog-assisted cloud storage which can achieve much higher throughput compared to the traditional cloud-only storage architecture by reducing the traffics toward the cloud storage. The fog-st... This paper introduces a new fog-assisted cloud storage which can achieve much higher throughput compared to the traditional cloud-only storage architecture by reducing the traffics toward the cloud storage. The fog-storage service providers are transparency to end-users and therefore, no modification on the end-user devices is necessary. This new system is featured with(1) a stronger audit scheme which is naturally coupled with the proposed architecture and does not suffer from the replay attack and(2) a transparent and efficient compensation mechanism for the fog-storage service providers. We provide rigorous theoretical analysis on the correctness and soundness of the proposed system. To the best of our knowledge, this is the first paper to discuss about a storage data audit scheme for fog-assisted cloud storage as well as the compensation mechanism for the service providers of the fog-storage service providers. 展开更多
关键词 FOG computing cloud computing network storage data AUDIT MERKLE hash tree integer FACTORIZATION PAYMENT transparency
原文传递
Efficiency analysis of numerical integrations for finite element substructure in real-time hybrid simulation 被引量:5
10
作者 Wang Jinting Lu Liqiao Zhu Fei 《Earthquake Engineering and Engineering Vibration》 SCIE EI CSCD 2018年第1期73-86,共14页
Finite element(FE) is a powerful tool and has been applied by investigators to real-time hybrid simulations(RTHSs). This study focuses on the computational efficiency, including the computational time and accuracy... Finite element(FE) is a powerful tool and has been applied by investigators to real-time hybrid simulations(RTHSs). This study focuses on the computational efficiency, including the computational time and accuracy, of numerical integrations in solving FE numerical substructure in RTHSs. First, sparse matrix storage schemes are adopted to decrease the computational time of FE numerical substructure. In this way, the task execution time(TET) decreases such that the scale of the numerical substructure model increases. Subsequently, several commonly used explicit numerical integration algorithms, including the central difference method(CDM), the Newmark explicit method, the Chang method and the Gui-λ method, are comprehensively compared to evaluate their computational time in solving FE numerical substructure. CDM is better than the other explicit integration algorithms when the damping matrix is diagonal, while the Gui-λ(λ = 4) method is advantageous when the damping matrix is non-diagonal. Finally, the effect of time delay on the computational accuracy of RTHSs is investigated by simulating structure-foundation systems. Simulation results show that the influences of time delay on the displacement response become obvious with the mass ratio increasing, and delay compensation methods may reduce the relative error of the displacement peak value to less than 5% even under the large time-step and large time delay. 展开更多
关键词 real-time hybrid simulation computational efficiency numerical integration storage optimization time delay
在线阅读 下载PDF
Multi-stage expansion planning of energy storage integrated soft open points considering tie-line reconstruction 被引量:3
11
作者 Peng Li Jie Ji +6 位作者 Sirui Chen Haoran Ji Jing Xu Guanyu Song Jinli Zhao Jianzhong Wu Chengshan Wang 《Protection and Control of Modern Power Systems》 2022年第1期670-684,共15页
With the rapid development of flexible interconnection technology in active distribution networks(ADNs),many power electronic devices have been employed to improve system operational performance.As a novel fully-con-t... With the rapid development of flexible interconnection technology in active distribution networks(ADNs),many power electronic devices have been employed to improve system operational performance.As a novel fully-con-trolled power electronic device,energy storage integrated soft open point(ESOP)is gradually replacing traditional switches.This can significantly enhance the controllability of ADNs.To facilitate the utilization of ESOP,device loca-tions and capacities should be configured optimally.Thus,this paper proposes a multi-stage expansion planning method of ESOP with the consideration of tie-line reconstruction.First,based on multi-terminal modular design characteristics,the ESOP planning model is established.A multi-stage planning framework of ESOP is then presented,in which the evolutionary relationship among different planning schemes is analyzed.Based on this framework,a multi-stage planning method of ESOP with consideration of tie-line reconstruction is subsequently proposed.Finally,case studies are conducted on a modified practical distribution network,and the cost-benefit analysis of device and multiple impact factors are given to prove the effectiveness of the proposed method. 展开更多
关键词 Active distribution network(ADN) Energy storage integrated soft open points(ESOP) Multi-stage expansion planning Tie-line reconstruction
原文传递
Deep Learning Applied to Computational Mechanics:A Comprehensive Review,State of the Art,and the Classics 被引量:1
12
作者 Loc Vu-Quoc Alexander Humer 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第11期1069-1343,共275页
Three recent breakthroughs due to AI in arts and science serve as motivation:An award winning digital image,protein folding,fast matrix multiplication.Many recent developments in artificial neural networks,particularl... Three recent breakthroughs due to AI in arts and science serve as motivation:An award winning digital image,protein folding,fast matrix multiplication.Many recent developments in artificial neural networks,particularly deep learning(DL),applied and relevant to computational mechanics(solid,fluids,finite-element technology)are reviewed in detail.Both hybrid and pure machine learning(ML)methods are discussed.Hybrid methods combine traditional PDE discretizations with ML methods either(1)to help model complex nonlinear constitutive relations,(2)to nonlinearly reduce the model order for efficient simulation(turbulence),or(3)to accelerate the simulation by predicting certain components in the traditional integration methods.Here,methods(1)and(2)relied on Long-Short-Term Memory(LSTM)architecture,with method(3)relying on convolutional neural networks.Pure ML methods to solve(nonlinear)PDEs are represented by Physics-Informed Neural network(PINN)methods,which could be combined with attention mechanism to address discontinuous solutions.Both LSTM and attention architectures,together with modern and generalized classic optimizers to include stochasticity for DL networks,are extensively reviewed.Kernel machines,including Gaussian processes,are provided to sufficient depth for more advanced works such as shallow networks with infinite width.Not only addressing experts,readers are assumed familiar with computational mechanics,but not with DL,whose concepts and applications are built up from the basics,aiming at bringing first-time learners quickly to the forefront of research.History and limitations of AI are recounted and discussed,with particular attention at pointing out misstatements or misconceptions of the classics,even in well-known references.Positioning and pointing control of a large-deformable beam is given as an example. 展开更多
关键词 Deep learning breakthroughs network architectures backpropagation stochastic optimization methods from classic to modern recurrent neural networks long short-term memory gated recurrent unit attention transformer kernel machines Gaussian processes libraries Physics-Informed Neural networks state-of-the-art history limitations challenges Applications to computational mechanics Finite-element matrix integration improved Gauss quadrature Multiscale geomechanics fluid-filled porous media Fluid mechanics turbulence proper orthogonal decomposition Nonlinear-manifold model-order reduction autoencoder hyper-reduction using gappy data control of large deformable beam
在线阅读 下载PDF
云计算环境下多模态异构网络数据安全存储方法
13
作者 李晓静 杨秀杰 《现代电子技术》 北大核心 2025年第6期63-67,共5页
为了快速、准确地存储多模态异构网络数据,提出一种云计算环境下多模态异构网络数据安全存储方法。采用编译套件部署多模态异构网络,利用后端编译模组生成网络的初始化配置,再利用前端编译模组分析与优化网络。针对多模态异构网络,构建... 为了快速、准确地存储多模态异构网络数据,提出一种云计算环境下多模态异构网络数据安全存储方法。采用编译套件部署多模态异构网络,利用后端编译模组生成网络的初始化配置,再利用前端编译模组分析与优化网络。针对多模态异构网络,构建包括客户端、服务器端、云存储服务插件、元数据存储的私有云存储架构。私有云存储架构采用虚拟化加解密方式,运行基于匿名广播加密的数据加密算法,引入拉格朗日插值方法,利用数据对应的会话密钥实现多模态异构网络数据的安全存储。实验结果表明,所提方法能够高效地存储多模态异构网络数据,数据传输的吞吐量高于3 Mb/s,加解密耗时低,存储的完整性高。 展开更多
关键词 云计算环境 多模态 异构网络 数据安全 存储方法 匿名广播加密 云存储架构
在线阅读 下载PDF
无线算力网络的确定性技术研究与展望
14
作者 王玮 顾晨辉 +2 位作者 刘伊莎 张殿鑫 张朝阳 《移动通信》 2025年第3期30-36,共7页
无线算力网络充分挖掘并利用了移动终端的算力资源,极大地提升了计算过程的灵活性与实时性。旨在面向确定性性能需求和随机性传输环境的矛盾,深入分析无线算力网络特性,研究和展望无线算力网络的确定性技术。从算力网络与确定性技术的... 无线算力网络充分挖掘并利用了移动终端的算力资源,极大地提升了计算过程的灵活性与实时性。旨在面向确定性性能需求和随机性传输环境的矛盾,深入分析无线算力网络特性,研究和展望无线算力网络的确定性技术。从算力网络与确定性技术的发展现状切入,涵盖网络架构、业务场景,从算力信息收集、算力资源调度、算力服务平台三方面探讨支撑确定性技术的算力管控体系,重点介绍了随机网络演算、极值理论、随机优化、机器学习等对抗随机性的确定性技术理论基础,并针对无线算力网络中随机无线环境与通信计算耦合的技术挑战,详细分析和展望了面向无线算力网络的确定性技术方案。这些技术的发展将进一步推动算网融合,提升网络在新兴行业应用的服务能力,为业务提供确定性性能保障。 展开更多
关键词 算力网络 确定性网络 算力调度 通信计算一体化
在线阅读 下载PDF
高职计算机网络技术专业群1+X证书制度实践研究
15
作者 杨静 刘旭莹 王丽丽 《数字通信世界》 2025年第2期234-236,共3页
在国家职教改革背景下,1+X证书制度成为创新教育模式,助力高职计算机网络技术专业群对接市场需求。本文通过实施1+X证书制度,强化学生职业技能与实践力,旨在培育高素质技能型人才,有效提升学生就业竞争力。
关键词 高职院校 计算机网络 1+X证书制度 产教融合
在线阅读 下载PDF
CAInNet:面向AI加速的通算一体网内计算模型
16
作者 刘忠沛 杨翔瑞 +4 位作者 杨凌 高源航 吕高锋 王宝生 苏金树 《计算机学报》 北大核心 2025年第1期19-34,共16页
AI时代的到来对当今算力提出了双重挑战,一方面涉及推理,另一方面涉及分布式训练。将一部分分布式应用的计算任务卸载到高速网络的网卡或交换机能够潜在提升分布式应用的性能表现,并发挥网络的关键作用。如在交换机或网卡中卸载参数聚... AI时代的到来对当今算力提出了双重挑战,一方面涉及推理,另一方面涉及分布式训练。将一部分分布式应用的计算任务卸载到高速网络的网卡或交换机能够潜在提升分布式应用的性能表现,并发挥网络的关键作用。如在交换机或网卡中卸载参数聚合等计算功能能够有效降低模型训练时产生的大量通信开销。基于P4语言的可编程数据平面除了使网络协议定制更加灵活外,还使得网络数据平面能够为分布式应用提供简单的网内计算服务。然而,当前典型的基于P4语言的可编程数据平面架构如协议无关交换架构(PISA)在进行矩阵运算等方面还表现得不够高效。分析该缺陷的关键原因在于:PISA架构中的超长指令字计算引擎在处理大规模并行同构计算任务时效率不高。针对上述问题,提出了一种面向AI加速的通算一体网内计算模型CAInNet。该模型在传统可编程数据平面的基础上,创新性地融合了单指令多数据流(SIMD)与多指令多数据流(MIMD)两种计算模式,使得网络设备不仅能够支持协议无关网络分组处理,还能在分组传输过程中对承载AI推理与训练的数据做网内计算。为了验证CAInNet在网内计算以及网络可编程方面的能力和效果,我们在该模型中使用带内网络遥测实现网络可视化,并部署多层感知机(MLP)模型实现基于AI的报文分类,替代传统的基于TCAM查表的路由方法。实验表明,采用机器学习推理的报文分类方法在包含5k路由表项的场景下,其准确度高达98.3%,同时节省了98.7%的存储空间,有效地解决了路由爆炸问题。与现有方法相比,将机器学习推理部署在CAInNet中不增加可编程数据平面的处理延迟,且仅消耗适量计算资源。 展开更多
关键词 AI硬件加速 通算一体 网内计算 可编程网络 报文分类 深度神经网络
在线阅读 下载PDF
An Efficient Method for Checking the Integrity of Data in the Cloud 被引量:2
17
作者 TAN Shuang TAN Lin +1 位作者 LI Xiaoling JIA Yan 《China Communications》 SCIE CSCD 2014年第9期68-81,共14页
Cloud computing and storage services allow clients to move their data center and applications to centralized large data centers and thus avoid the burden of local data storage and maintenance.However,this poses new ch... Cloud computing and storage services allow clients to move their data center and applications to centralized large data centers and thus avoid the burden of local data storage and maintenance.However,this poses new challenges related to creating secure and reliable data storage over unreliable service providers.In this study,we address the problem of ensuring the integrity of data storage in cloud computing.In particular,we consider methods for reducing the burden of generating a constant amount of metadata at the client side.By exploiting some good attributes of the bilinear group,we can devise a simple and efficient audit service for public verification of untrusted and outsourced storage,which can be important for achieving widespread deployment of cloud computing.Whereas many prior studies on ensuring remote data integrity did not consider the burden of generating verification metadata at the client side,the objective of this study is to resolve this issue.Moreover,our scheme also supports data dynamics and public verifiability.Extensive security and performance analysis shows that the proposed scheme is highly efficient and provably secure. 展开更多
关键词 cloud computing storage security public auditability provable data integrity
在线阅读 下载PDF
Security Analysis on a Remote Data Auditing Scheme for Distributed Storage Systems 被引量:1
18
作者 LIU Guangjun ZHANG Lining LI Xiangjun 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2020年第6期527-530,共4页
Remote data auditing becomes critical to ensure the storage reliability in distributed cloud storage.Recently,Le et al proposed an efficient private data auditing scheme NC-Audit designed for regenerating codes,which ... Remote data auditing becomes critical to ensure the storage reliability in distributed cloud storage.Recently,Le et al proposed an efficient private data auditing scheme NC-Audit designed for regenerating codes,which claimed that NC-Audit can effectively realize privacy-preserving data auditing for distributed storage systems.However,our analysis shows that NC-Audit is not secure for that the adversarial cloud can forge some illegal blocks to cheat the auditor successfully with a high probability even without storing the user’s whole data,when the coding field is large enough. 展开更多
关键词 data auditing regeneration code network coding distributed storage cloud computing
原文传递
无线算力网络:架构与关键技术
19
作者 郭凤仙 闫实 +3 位作者 彭木根 刘亮 王尚广 石川 《移动通信》 2025年第3期2-9,共8页
在智能时代,无线网络引入了边缘计算、雾计算等技术,并向云化、开放化、智能化等方向持续演进,网络的计算能力逐渐增强。在未来,无线网络的作用将发生根本性变革,如支持内生计算、原生AI、通算融合等。无线算力网络旨在构建通算一体化... 在智能时代,无线网络引入了边缘计算、雾计算等技术,并向云化、开放化、智能化等方向持续演进,网络的计算能力逐渐增强。在未来,无线网络的作用将发生根本性变革,如支持内生计算、原生AI、通算融合等。无线算力网络旨在构建通算一体化的智能服务系统,实现无线接入网络内生算力对外开放以及原生AI支持,协同云、边、站、端多级算力,保障未来智能应用的端到端需求。首先从核心网、承载网、接入网三个方面概述了通算融合的研究现状。然后介绍了无线算力网络的体系架构和关键技术,包括算力基站、通算融合调度、移动性管理、云边端协同调度等技术,阐述了其原理和相关方法,旨在充分利用无线网络通算融合优势,以支持原生AI和未来智能应用的需求。最后总结了无线算力网络面临的技术挑战,并对未来的发展方向进行了展望。 展开更多
关键词 无线算力网络 通算融合 原生AI 云边端协同
在线阅读 下载PDF
动态车辆网络场景中的协同空地计算卸载和资源优化
20
作者 王俊华 罗菲 +1 位作者 高广鑫 李斌 《电子与信息学报》 北大核心 2025年第1期102-115,共14页
针对移动用户数量迅猛增长和地面基础设施分布稀疏所带来的挑战,该文提出一种能量收集辅助的空地协同计算卸载架构。该架构充分利用无人机(UAVs)的灵活机动性和路侧单元(RSUs)及基站(BS)的强大算力,实现了任务计算的动态实时分发。特别... 针对移动用户数量迅猛增长和地面基础设施分布稀疏所带来的挑战,该文提出一种能量收集辅助的空地协同计算卸载架构。该架构充分利用无人机(UAVs)的灵活机动性和路侧单元(RSUs)及基站(BS)的强大算力,实现了任务计算的动态实时分发。特别地,无人机通过能量收集来维持其持续运行和稳定的计算性能。考虑到无人机与地面车辆的高动态性、车辆计算任务的随机性,以及信道模型的时变性,提出一个能耗受限的长期优化问题,旨在从全局角度有效降低整个系统的平均时延。为了解决这一复杂的混合整数规划(MIP)问题,提出一种基于改进演员-评论家(Actor-Critic)强化学习算法的计算卸载策略(IACA)。该算法运用李雅普诺夫优化技术,将长期系统时延优化问题分解为一系列易于处理的帧级子问题。然后,利用遗传算法计算目标Q值替代目标神经网络输出以调整强化学习进化方向,有效避免了算法陷入局部最优,从而实现动态车辆网络中的高效卸载和资源优化。通过综合仿真验证了所提计算卸载架构和算法的可行性和优越性。 展开更多
关键词 空地一体化车联网 能量收集 计算卸载 强化学习 遗传算法
在线阅读 下载PDF
上一页 1 2 50 下一页 到第
使用帮助 返回顶部