Dissertationen zum Thema „Embedding Network“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Dissertationen für die Forschung zum Thema "Embedding Network" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Bays, Leonardo Richter. „Virtual network embedding in software-defined networks“. reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2017. http://hdl.handle.net/10183/178658.
Der volle Inhalt der QuelleResearch on network virtualization has been active for a number of years, during which a number of virtual network embedding (VNE) approaches have been proposed. These approaches, however, neglect important operational requirements imposed by the underlying virtualization platforms. In the case of SDN/OpenFlow-based virtualization, a crucial example of an operational requirement is the availability of enough memory space for storing flow rules in OpenFlow devices. Due to these circumstances, we advocate that VNE must be performed with some degree of knowledge of the underlying physical networks, otherwise the deployment may suffer from unpredictable or even unsatisfactory performance. Considering SDN/OpenFlow-based physical networks as an important virtualization scenario, we propose a framework based on VNE and OpenFlow coordination for proper deployment of virtual networks (VNs). The proposed approach unfolds in the following main contributions a virtual infrastructure abstraction that allows a service provider to represent the details of his/her VN requirements in a comprehensive manner; a privacy-aware compiler that is able to preprocess this detailed VN request in order to obfuscate sensitive information and derive computable operational requirements; a model for embedding requested VNs that aims at maximizing their feasibility at the physical level. Results obtained through an evaluation of our framework demonstrate that taking such operational requirements into account, as well as accurately assessing them, is of paramount importance to ensure the “health” of VNs hosted on top of the virtualization platform.
Ghazar, Tay. „Efficient Virtual Network Embedding onto A Hierarchical-Based Substrate Network Framework“. Thèse, Université d'Ottawa / University of Ottawa, 2013. http://hdl.handle.net/10393/23932.
Der volle Inhalt der QuelleChochlidakis, Georgios. „Mobility-aware virtual network embedding techniques for next-generation mobile networks“. Thesis, King's College London (University of London), 2018. https://kclpure.kcl.ac.uk/portal/en/theses/mobilityaware-virtual-network-embedding-techniques-for-nextgeneration-mobile-networks(174e714f-2a4a-447a-bcd5-d526170377fd).html.
Der volle Inhalt der QuelleDietrich, David [Verfasser]. „Multi-provider network service embedding / David Dietrich“. Hannover : Technische Informationsbibliothek (TIB), 2016. http://d-nb.info/109909643X/34.
Der volle Inhalt der QuelleWåhlin, Lova. „Towards Machine Learning Enabled Automatic Design of IT-Network Architectures“. Thesis, KTH, Matematisk statistik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-249213.
Der volle Inhalt der QuelleDet är många maskininlärningstekniker som inte kan appliceras på data i form av en graf. Tekniker som graph embedding, med andra ord att mappa en graf till ett vektorrum, can öppna upp för en större variation av maskininlärningslösningar. Det här examensarbetet evaluerar hur väl statiska graph embeddings kan fånga viktiga säkerhetsegenskaper hos en IT-arkitektur som är modellerad som en graf, med syftet att användas i en reinforcement learning algoritm. Dom egenskaper i grafen som används för att validera embedding metoderna är hur lång tid det skulle ta för en obehörig attackerare att penetrera IT-arkitekturen. Algorithmerna som implementeras är node embedding metoderna node2vec och gat2vec, samt graph embedding metoden graph2vec. Dom prediktiva resultaten är jämförda med två basmetoder. Resultaten av alla tre metoderna visar tydliga förbättringar relativt basmetoderna, där F1 värden i några fall uppvisar en fördubbling. Det går alltså att dra slutsatsen att att alla tre metoder kan fånga upp säkerhetsegenskaper i en IT-arkitektur. Dock går det inte att säga att statiska graph embeddings är den bästa lösningen till att representera en graf i en reinforcement learning algoritm, det finns andra komplikationer med statiska metoder, till exempel att embeddings från dessa metoder inte kan generaliseras till data som inte var använd till träning. För att kunna dra en absolut slutsats krävs mer undersökning, till exempel av dynamiska graph embedding metoder.
Moura, Leonardo Fernando dos Santos. „Branch & price for the virtual network embedding problem“. reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2015. http://hdl.handle.net/10183/115213.
Der volle Inhalt der QuelleVirtualization allows one or more virtual networks to share physical infrastructures. The Virtual Network Embedding problem (VNEP) is one of the main challenges in the virtualization of physical networks. This problem consists in mapping a virtual network into a physical network while respecting capacity constraints. This work shows that finding a feasible solution for this problem is NP-Hard. However, many instances can be solved up to optimality in practice by exploiting the problem structure. We present a Branch & Price algorithm applied to instances of different topologies and sizes. The experimental results suggest that the proposed algorithm is superior to the Integer Linear Programming model solved by CPLEX.
DeFreeuw, Jonathan Daniel. „Embedding Network Information for Machine Learning-based Intrusion Detection“. Thesis, Virginia Tech, 2019. http://hdl.handle.net/10919/99342.
Der volle Inhalt der QuelleMS
Boutigny, François. „Multidomain virtual network embedding under security-oriented requirements applied to 5G network slices“. Electronic Thesis or Diss., Institut polytechnique de Paris, 2019. http://www.theses.fr/2019IPPAS002.
Der volle Inhalt der Quelle5G brings a new concept called network slicing. This technology makes it possible to generalize the business model of MVNOs to companies in need to operate a network, without it being their core business. Each slice is an end-to-end, dedicated and customized virtual network, over a shared infrastructure; this infrastructure itself is provided by the interconnection of infrastructure providers: we refer to this case as a multi-domain infrastructure.The objective of this thesis is to study the allocation of these slices in such a multi-domain infrastructure. The problem is known as Virtual Network Embedding (VNE). It is an NP-hard problem. Practically, the VNE problem looks for which physical resources to associate a set of virtual elements. Physical resources describe what they can offer. Virtual elements describe what they require. Linking these offers and requests is the key to solve the VNE problem.In this thesis, we focused on modeling and implementing security requirements. Indeed, we expect that the initiators of the slices belong to areas distant from telecommunications. In the same way that they know little about this field, we can expect that their needs, especially in security, are novel in the slice context.This thesis presents an algorithm able to handling various requirements, according to an extensible model based on a Satisfiability Modulo Theories (SMT) solver. Compared to Integer Linear Programming (ILP), more common in the VNE field, this formulation allows to express the satisfaction constraints in a more transparent way, and allows to audit all the constraints.Moreover, being aware that infrastructure providers are reluctant to disclose information about their physical resources, we propose a resolution limiting this disclosure. This system has been successfully implemented and tested during the Ph.D
Törnegren, Viktor. „Applying Similarity Condition Embedding Network to an industrial fashion dataset“. Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-283351.
Der volle Inhalt der QuelleFör att skapa en mode riktigt klädes outfit behöver man ta hänsyn till flertalet olika faktoer, som t.ex. säsong, färg samt i vilken typ av sammanghang klädesutstyrseln är tänkt att bäras inom etc. Detta är naturligtvis en svår uppgift för en människa att göra men det är ett ännu svårare problem för en dator att lösa. För att lära en algorithm att ta hänsyn till olika likhetsvillkor introducerade Veit, Belongie och Karaletsos [1] och Vasileva m. fl. [2] två olika modeller som använder sig av förbestämda likhetsvillkor. Vidare blev Tan m. fl. [3] inspirerad av [1, 2] och skapade en algorithm som kan lära sig likhetsvillkor via oövervakad inlärning, denna modell testade dom på ett dataset som innehåller klädesutstyrsal som är skapade av vanliga människor. I detta examensarbete presenterar vi ett nytt modedataset som har skapats med hjälp av modeexperter från Henns & Mauritz AB. Vidare bevisar vi att våran implementering av Similarity Condition Embedding Network (SCE-net) från [3] kan välja ut ett klädesplagg som tillsammans med tidigare utvalda plagg skapar en outfit samt utvärdera om klädesplaggen i en outfit är kompatibla eller inte. Vi utför dessa tester på data som innehåller kläder för både män och kvinnor. Vi visar också att SCE-net tränas med data som innehåller kläder för ett kön för att senare prediktera kläder i outfits för ett annat kön. Vidare tillhandahåller vi resultat som påvisar att SCE-net generaliserar väl till osedda kategorier genom att träna modellen på outfits som inte innehåller accessoarer och sedan testar vi modellen på klädes utstyrslar som innehåller accessoarer. Utöver detta introducerar vi även ett dataset som innehåller artiklar från kunders kundvagnar från Hennes & Mauritz onlinebutiker samt deras fysiska butiker. Med hjälp av denna data visar vi att våran implementering av SCE-net kan prediktera nästa vara i en kunds varukorg.
Okuno, Akifumi. „Studies on Neural Network-Based Graph Embedding and Its Extensions“. Kyoto University, 2020. http://hdl.handle.net/2433/259075.
Der volle Inhalt der QuelleZaman, Faisal Ameen. „VN Embedding in SDN-based Metro Optical Network for Multimedia Services“. Thesis, Université d'Ottawa / University of Ottawa, 2017. http://hdl.handle.net/10393/35933.
Der volle Inhalt der QuelleLe, Khanh Duc. „A Study of Face Embedding in Face Recognition“. DigitalCommons@CalPoly, 2019. https://digitalcommons.calpoly.edu/theses/1989.
Der volle Inhalt der QuelleBays, Leonardo Richter. „Efficient online embedding of secure virtual nteworks“. reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2013. http://hdl.handle.net/10183/71913.
Der volle Inhalt der QuelleNetwork virtualization has become increasingly prominent in recent years. It enables the creation of network infrastructures that are specifically tailored to the needs of distinct network applications and supports the instantiation of favorable en- vironments for the development and evaluation of new architectures and protocols. Although recent efforts (motivated mainly by the search for mechanisms to eval- uate Future Internet proposals) have contributed substantially to materialize this concept, none of them has attempted to combine efficient resource mapping with ful- fillment of security requirements (e.g., confidentiality). It is important to note that, in the context of virtual networks, the protection of shared network infrastructures constitutes a fundamental condition to enable its use in large scale. Considering the negative impact of security provisions in the virtual network embedding process is of paramount importance in order to fully utilize physical re- sources without underestimating capacity requirements. Therefore, in this thesis we propose both an optimal model and a heuristic algorithm for embedding virtual networks on physical substrates that aim to optimize physical resource usage while meeting security requirements. Both approaches feature precise modeling of over- head costs of security mechanisms used to protect virtual networks, and are able to handle virtual network requests in an online manner. In addition, we present the results of an extensive evaluation we carried out, including a detailed comparison of both the optimal model and the heuristic algorithm. Our experiments show that the Integer Linear Programming (ILP) model is capable of optimally embedding virtual networks on physical infrastructures with up to a hundred routers, while the heuristic algorithm is capable of scaling to larger infrastructures, providing timely, sub-optimal mappings.
Demirci, Mehmet. „Facilitating the provision of auxiliary support services for overlay networks“. Diss., Georgia Institute of Technology, 2013. http://hdl.handle.net/1853/49089.
Der volle Inhalt der QuelleZhu, Xiaoting. „Systematic Assessment of Structural Features-Based Graph Embedding Methods with Application to Biomedical Networks“. University of Cincinnati / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1592394966493963.
Der volle Inhalt der QuelleZha, Xiao. „Topological Data Analysis on Road Network Data“. The Ohio State University, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=osu155563664988436.
Der volle Inhalt der QuelleOliveira, Rodrigo Ruas. „Toward cost-efficient Dos-resilient virtual networks with ORE : opportunistic resilience embedding“. reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2013. http://hdl.handle.net/10183/71908.
Der volle Inhalt der QuelleRecently, the Internet’s success has prevented the dissemination of novel networking architectures and protocols. Specifically, any modification to the core of the network requires agreement among many different parties. To address this situation, Network Virtualization has been proposed as a diversifying attribute for the Internet. This paradigm promotes the development of new architectures and protocols by enabling the creation of multiple virtual networks on top of a same physical substrate. In addition, applications running over the same physical network can be isolated from each other, thus allowing them to coexist independently. One of the main advantages of this paradigm is the use of isolation to limit the scope of attacks. This can be achieved by creating different, isolated virtual networks for each task, so traffic from one virtual network does not interfere with the others. However, routers and links are still vulnerable to attacks and failures on the underlying network. Particularly, should a physical link be compromised, all embedded virtual links will be affected. Previous work tackled this problem with two main strategies: using backup resources to protect against disruptions; or live migration to relocate a compromised virtual resource. Both strategies have drawbacks: backup resources tend to be expensive for the infrastructure provider, while live migration may leave virtual networks inoperable during the recovery period. This dissertation presents ORE (Opportunistic Resilience Embedding), a novel embedding approach for protecting virtual links against substrate network disruptions. ORE’s design is two-folded: while a proactive strategy embeds virtual links into multiple substrate paths in order to mitigate the initial impact of a disruption, a reactive one attempts to recover any capacity affected by an underlying disruption. Both strategies are modeled as optimization problems. Additionally, since the embedding problem is NP-Hard, ORE uses a Simulated Annealing-based meta-heuristic to solve it efficiently. Numerical results show that ORE can provide resilience to disruptions at a lower cost.
Fischer, Andreas [Verfasser], Meer Hermann [Akademischer Betreuer] de und Wolfgang [Akademischer Betreuer] Kellerer. „An Evaluation Methodology for Virtual Network Embedding / Andreas Fischer ; Hermann de Meer, Wolfgang Kellerer“. Passau : Universität Passau, 2017. http://d-nb.info/1133360726/34.
Der volle Inhalt der QuelleShanmugam, Sakthivadivel Saravanakumar. „Fast-NetMF: Graph Embedding Generation on Single GPU and Multi-core CPUs with NetMF“. The Ohio State University, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=osu1557162076041442.
Der volle Inhalt der QuelleTieves, Martin [Verfasser], Arie Marinus [Akademischer Betreuer] Koster und Edoardo [Akademischer Betreuer] Amaldi. „Discrete and robust optimization approaches to network design with compression and virtual network embedding / Martin Tieves ; Arie Marinus Koster, Edoardo Amaldi“. Aachen : Universitätsbibliothek der RWTH Aachen, 2016. http://d-nb.info/1130871932/34.
Der volle Inhalt der QuelleChen, Huiyuan. „Dimension Reduction for Network Analysis with an Application to Drug Discovery“. Case Western Reserve University School of Graduate Studies / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=case1598303654048332.
Der volle Inhalt der QuelleLaasch, Oliver. „Business model change through embedding corporate responsibility-sustainability? : logics, devices, actor networks“. Thesis, University of Manchester, 2018. https://www.research.manchester.ac.uk/portal/en/theses/business-model-change-through-embedding-corporate-responsibilitysustainabilitylogics-devices-actor-networks(6826955d-df8f-4428-9bb6-2cb82f2e8519).html.
Der volle Inhalt der QuelleSong, Yihong. „P-Cycle-based Protection in Network Virtualization“. Thèse, Université d'Ottawa / University of Ottawa, 2013. http://hdl.handle.net/10393/23813.
Der volle Inhalt der QuelleBotero, Vega Juan Felipe. „Study, evaluation and contributions to new algorithms for the embedding problem in a network virtualization environment“. Doctoral thesis, Universitat Politècnica de Catalunya, 2013. http://hdl.handle.net/10803/120754.
Der volle Inhalt der QuelleLuizelli, Marcelo Caggiani. „Uma abordagem baseada em aspectos topológicos para expansão de redes físicas no contexto de virtualização de redes“. reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2014. http://hdl.handle.net/10183/97100.
Der volle Inhalt der QuelleNetwork virtualization is a mechanism that allows the coexistence of multiple virtual networks on top of a single physical substrate. One of the research challenges addressed recently in the literature is the efficient mapping of virtual resources on physical infrastructures. Although this challenge has received considerable attention, state-of-the-art approaches present, in general, a high rejection rate, i.e., the ratio between the number of denied virtual network requests and the total amount of requests is considerably high. In this thesis, we characterize the relationship between the quality of virtual network mappings and the topological structures of the underlying substrates. Exact solutions of an online embedding model are evaluated under different classes of network topologies. From the understanding of the topological factors that directly influence the virtual network embedding process, we propose an expansion strategy of physical infrastructure in order to suggest adjustments that lead to higher virtual network acceptance and, in consequence, to improved physical resource utilization. The obtained results demonstrate that most of rejections occur in situations in which a significant amount of resource is available, but a few saturated devices and links, depending on connectivity features of the physical substrate, hinder the acceptance of new requests. Moreover, the obtained results using the proposed strategy evidence that an expansion of 10% to 20% of the infrastructure resources leads to a sustained increase of up to 30% in the number of accepted virtual networks and of up to 45% in resource usage compared to the original network.
Bird, Peter William. „Potentially disruptive IS innovation in UK higher education institutions : an actor-network theory analysis of the embedding of m-learning“. Thesis, Manchester Metropolitan University, 2014. http://e-space.mmu.ac.uk/332166/.
Der volle Inhalt der QuelleLi, Shuopeng. „Contribution à une instanciation efficace et robuste des réseaux virtuels sous diverses contraintes“. Thesis, Sorbonne Paris Cité, 2017. http://www.theses.fr/2017USPCD066/document.
Der volle Inhalt der QuelleNetwork virtualization allows to create logical or virtual networks on top of a shared physical or substrate network. The resource allocation problem is an important issue in network virtualization. It corresponds to a well known problem called virtual network embedding (VNE). VNE consists in mapping each virtual node to one substrate node and each virtual link to one or several substrate paths in a way that the objective is optimized and the constraints verified. The objective often corresponds to the optimization of the node computational resources and link bandwidth whereas the constraints generally include geographic location of nodes, CPU, bandwidth, etc. In the multi-domain context where the knowledge of routing information is incomplete, the optimization of node and link resources are difficult and often impossible to achieve. Moreover, to ensure service continuity even upon failure, VNE should cope with failures by selecting the best and resilient mappings. Inthisthesis,westudytheVNEresourceallocationproblemunderdifferentrequirements. To embed a virtual network on multi-domain substrate network, we propose a joint peering and intra domain link mapping method. With reduced and limited information disclosed by the domains, our downsizing algorithm maps the intra domain and peering links in the same stage so that the resource utilization is optimized. To enhance the reliability of virtual networks, we propose a failure avoidance approach that minimizes the failure probability of virtual networks. Exact and heuristic solutions are proposed and detailed for the infinite and limited bandwidth link models. Moreover, we combine the failure avoidance with the failure protection in our novel protection-level-aware survivable VNE in order to improve the reliability. With this last approach, the protectable then the less vulnerable links are first selected for link mapping. To determine the protectable links, we propose a maxflow based heuristic that checks for the existence of backup paths during the primary mapping stage. In case of insufficient backup resources, the failure probability is reduced
Fang, Chunsheng. „Novel Frameworks for Mining Heterogeneous and Dynamic Networks“. University of Cincinnati / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1321369978.
Der volle Inhalt der QuelleYoho, Jason Jon. „Physically-Based Realizable Modeling and Network Synthesis of Subscriber Loops Utilized in DSL Technology“. Diss., Virginia Tech, 2001. http://hdl.handle.net/10919/29738.
Der volle Inhalt der QuellePh. D.
Chennupati, Nikhil. „Recommending Collaborations Using Link Prediction“. Wright State University / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=wright1621899961924795.
Der volle Inhalt der QuelleGilljam, Daniel, und Mario Youssef. „Jämförelse av artificiella neurala nätverksalgoritmerför klassificering av omdömen“. Thesis, KTH, Hälsoinformatik och logistik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-230660.
Der volle Inhalt der QuelleWith large amount of data in the form of customer reviews, it could be time consuming to manually go through each review and decide if its sentiment is positive or negative. This thesis have been done to automatically classify client reviews to determine if a review is positive or negative. This was dealt with by machine learning. Three different deep neural network was tested on greater and lesser datasets, and compared with the help of two different frameworks, TensorFlow and Keras. Different embedding methods were tested on the neural networks. The best combination of a neural network, a framework and anembedding was the Convolutional Neural Network (CNN) which used the word embedding method Word2Vec, was written in Keras framework and gave an accuracy of approximately 88.87% with a deviation of approximately 0.4%. CNN scored a better result in all of the tests in comparison with the two other neural networks, Recurrent NeuralNetwork (RNN) and Convolutional Recurrent Neural Network (CRNN).
Amarasinghe, Heli. „Network Resource Management in Infrastructure-as-a-Service Clouds“. Thesis, Université d'Ottawa / University of Ottawa, 2019. http://hdl.handle.net/10393/39141.
Der volle Inhalt der QuelleOliveira, R?mulo Reis de. „Heur?sticas para mapeamento de redes virtuais de sincronia h?brida“. Pontif?cia Universidade Cat?lica do Rio Grande do Sul, 2015. http://tede2.pucrs.br/tede2/handle/tede/8380.
Der volle Inhalt der QuelleApproved for entry into archive by Sheila Dias (sheila.dias@pucrs.br) on 2018-12-14T11:26:14Z (GMT) No. of bitstreams: 1 Romulo Reis de Oliveira_DIS.pdf: 1719302 bytes, checksum: 005f38fa0c94cb6b97ce5f6ad6ec70ed (MD5)
Made available in DSpace on 2018-12-14T11:50:26Z (GMT). No. of bitstreams: 1 Romulo Reis de Oliveira_DIS.pdf: 1719302 bytes, checksum: 005f38fa0c94cb6b97ce5f6ad6ec70ed (MD5) Previous issue date: 2015-04-24
Hybrid synchrony virtual networks arose by combining network virtualization, which allows the co-existence of several virtual networks in the same shared physical substrate, providing infrastructure in a flexible and economic way, with partial synchrony network architecture, which is relevant in distributed systems in order to build reliable systems. One of the main challenges in network virtualization is the efficient mapping of virtual resources in the substrate network, since it is a NP-Hard complexity problem. When considering the synchrony of virtual and physical resources it becomes more difficult to map, making it unfeasible to calculate the optimal solution in real environments. Thus, heuristic approaches are necessary for finding semi-optimal solutions faster. In this work, four heuristics for mapping hybrid synchrony virtual networks are adapted. In order to evaluate these heuristics, two sets of experiments were executed. In the first set is compared the optimal solutions with their respective semi-optimal solutions, the results show the heuristics? efficiency are better when the virtual network requests are smaller, furthermore there were some semi-optimal solution mapping costs equivalent to the optimal solution mapping cost. The second set of experiments evaluates the heuristics performance using a physical substrate closer to real context and a larger number of virtual network requests. The results of this second set of experiments demonstrate that even with a larger number of virtual requests and a larger substrate, the solutions were computed in acceptable time.
As redes virtuais de sincronia h?brida surgiram da combina??o entre a virtualiza??o de redes, a qual permite a coexist?ncia de v?rias redes virtuais no mesmo substrato f?sico compartilhado fornecendo infraestrutura de maneira flex?vel e econ?mica, e arquitetura de redes com sincronia parcial, essa relevante em sistemas distribu?dos para construir sistemas confi?veis. Um dos principais desafios em virtualiza??o de redes ? o mapeamento eficiente dos recursos virtuais na rede de substrato, pois ? um problema de complexidade NP-Dif?cil. Ao considerar a sincronia dos recursos virtuais e f?sicos, se torna mais dif?cil efetuar esse mapeamento, inviabilizando o c?lculo da solu??o ?tima em ambientes reais. Sendo assim, abordagens heur?sticas s?o necess?rias para encontrar solu??es semi-?timas de maneira mais r?pida. Neste trabalho s?o adaptadas quatro abordagens heur?sticas para efetuar o mapeamento de redes virtuais de sincronia h?brida. Para avaliar o desempenho dessas heur?sticas foram efetuados dois conjuntos de experimentos. No primeiro conjunto de experimentos s?o comparadas as solu??es ?timas e as respectivas solu??es semi-?timas, os resultados indicaram que a efici?ncia das heur?sticas s?o melhores quando as requisi??es de redes virtuais s?o menores, al?m disso houveram alguns custos de solu??es semi-?timas equivalentes ao custo de mapeamento da solu??o ?tima. O segundo conjunto de experimento avalia o desempenho das heur?sticas utilizando um substrato de rede mais pr?ximo do contexto real e um maior n?mero de requisi??es de redes virtuais. Os resultados desse segundo experimento demonstram que mesmo com um n?mero maior de requisi??es de redes virtuais e um substrato maior, as solu??es foram calculadas em tempo aceit?vel.
Wu, Haitao. „Conception et analyse d’algorithmes d’approximation dans les réseaux de communication de nouvelle génération“. Thesis, Avignon, 2018. http://www.theses.fr/2018AVIG0231/document.
Der volle Inhalt der QuelleWith the coming of intellectual era and Internet of Everything (IoE), the needs of worldwide communication and diverse applications have been explosively growing. This information revolution requires the future communication networks to be more efficient, intellectual, agile and scalable. Many technologies have emerged to meet the requirements of next generation communication networks such as Elastic Optical Networks (EONs) and networking virtualization. However, there are many challenges coming along with them, such as Routing and Spectrum Assignment (RSA) in EONs and Virtual Network Embedding (VNE) in network virtualization. This dissertation addresses the algorithm design and analysis for these challenging problems: the impacts of traffic distribution and network topology on lightpath routing, the distance spectrum assignment and the VNE problem for paths and cycles.For lightpath routing, the first subproblem of the RSA, there is always a pending issue that how the changes of the traffic distribution and EON topology affect it. As the lightpath routing plays a critical role in the overall performance of the RSA, this dissertation provides a thoroughly theoretical analysis on the impacts of the aforementioned two key factors. To this end, we propose two theoretical chains, and derive the optimal routing scheme taking into account two key factors. We then treat the second subproblem of RSA, namely spectrum assignment. Any two lightpaths sharing common fiber links might have to be isolated in the spectrum domain with a proper guard-band to prevent crosstalk and/or reduce physical-layer security threats. We consider the scenario with diverse guard-band sizes, and investigate how to assign the spectrum resources efficiently in such a situation. We provide the upper and lower bounds for the optimal solution of the DSA, and further devise an efficient algorithm which can guarantee approximation ratios in some graph classes.The topology heterogeneity of Virtual Network Requests (VNRs) is one important factor hampering the performance of the VNE. However, in many specialized applications, the VNRs are of some common structural features e.g., paths and cycles. To achieve better outcomes, it is thus critical to design dedicated algorithms for these applications by accounting for topology characteristics. We prove the NP-Harness of path and cycle embeddings. To solve them, we propose some efficient algorithms and analyze their approximation ratios
Catusse, Nicolas. „Spanners pour des réseaux géométriques et plongements dans le plan“. Thesis, Aix-Marseille 2, 2011. http://www.theses.fr/2011AIX22119/document.
Der volle Inhalt der QuelleIn this thesis, we study several problems related to the design of geometric networks and isometric embeddings into the plane.We start by considering the generalization of the classical Minimum Manhattan Network problem to all normed planes. We search the minimum network that connects each pair of terminals by a shortest path in this norm. We propose a factor 2.5 approximation algorithm in time O(mn^3), where n is the number of terminals and m is the number of directions of the unit ball.The second problem presented is an oriented version of the minumum Manhattan Network problem, we want to obtain a minimum oriented network such that for each pair u, v of terminals, there is a shortest rectilinear path from u to v and another path from v to u.We describe a factor 2 approximation algorithm with complexity O(n^3) where n is the number of terminals for this problem.Then we study the problem of finding a planar spanner (a subgraph which approximates the distances) of the Unit Disk Graph (UDG) which is used to modelize wireless ad hoc networks. We present an algorithm for computing a constant hop stretch factor planar spanner for all UDG. This algorithm uses only local properties and it can be implemented in distributed manner.Finally, we study the problem of recognizing metric spaces that can be isometrically embbed into the rectilinear plane and we provide an optimal time O(n^2) algorithm to solve this problem. We also study the generalization of this problem to all normed planes whose unit ball is a centrally symmetric convex polygon
Embretsén, Niklas. „Representing Voices Using Convolutional Neural Network Embeddings“. Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-261415.
Der volle Inhalt der QuelleI dagens samhälle ökar populariteten för röstbaserade tjänster. Att kunna förse användare med röster de tycker om, för att fånga och behålla deras uppmärksamhet, är därför viktigt för att förbättra användarupplevelsen. Att hitta ett effektiv sätt att representera röster, så att likheter mellan dessa kan jämföras, är därför av stor nytta. Inom fältet språkteknologi i maskininlärning har stora framstegs gjorts genom att skapa representationer av ord från de inre lagren av neurala nätverk, så kallade neurala nätverksinbäddningar. Dessa representationer har visat sig innehålla semantiken av orden. Denna uppsats avser att undersöka huruvida liknande representationer kan hittas för ljuddata i form av berättarröster från ljudböcker, där likhet mellan röster fångas upp. För att undersöka detta utvecklades och utvärderades två faltningsnätverk som använde sig av spektrogramrepresentationer av röstdata. Den ena modellen är konstruerad som en vanlig klassificeringsmodell, tränad för att skilja mellan uppläsare i datasetet. Den andra modellen använder parvisa förhållanden mellan datapunkterna och en Kullback–Leibler divergensbaserad optimeringsfunktion, med syfte att minimera och maximera skillnaden mellan lika och olika par av datapunkter. Från dessa modeller används representationer från de olika lagren av nätverket för att representera varje datapunkt under utvärderingen. Både en objektiv och subjektiv utvärderingsmetod används. Under den objektiva utvärderingen undersöks först om de funna representationerna är distinkta för olika uppläsare, sedan undersöks även om dessa fångar upp information om uppläsarens kön. Den vanliga klassificeringsmodellen utvärderas också genom ett användartest, eftersom den modellen nådde en storleksordning bättre resultat under den objektiva utvärderingen. Syftet med användartestet var att undersöka om de funna representationerna innehåller information om den upplevda likheten mellan rösterna. Slutsatsen är att det föreslagna tillvägagångssättet har potential till att användas för att representera röster så att information om likhet fångas upp, men att det krävs mer omfattande testning, undersökning och utvärdering. För framtida studier föreslås mer sofistikerad förbehandling av data samt att samla in och använda sig av data kring förhållandet mellan röster under träningen av modellerna.
Hehl, Ulrich. „Embedding of synchronous spike activity in cortical networks“. [S.l.] : [s.n.], 2001. http://www.freidok.uni-freiburg.de/volltexte/340/.
Der volle Inhalt der QuelleKarapoulios, Vasileios. „Person Re-Identification in the wild : Evaluation and application for soccer games using Deep Learning“. Thesis, Linköpings universitet, Statistik och maskininlärning, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177359.
Der volle Inhalt der QuelleSuta, Adin. „Multilabel text classification of public procurements using deep learning intent detection“. Thesis, KTH, Matematisk statistik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-252558.
Der volle Inhalt der QuelleData i form av text är en av de mest utbredda formerna av data och mängden tillgänglig textdata runt om i världen ökar i snabb takt. Text kan tolkas som en följd av bokstäver eller ord, där tolkning av text i form av ordföljder är absolut vanligast. Genombrott inom artificiell intelligens under de senaste åren har medfört att fler och fler arbetsuppgifter med koppling till text assisteras av automatisk textbearbetning. Modellerna som introduceras i denna uppsats är baserade på djupa artificiella neuronnät med sekventiell bearbetning av textdata, som med hjälp av regression förutspår tillhörande ämnesområde för den inmatade texten. Flera modeller och tillhörande hyperparametrar utreds och jämförs enligt prestanda. Datamängden som använts är tillhandahållet av e-Avrop, ett svenskt företag som erbjuder en webbtjänst för offentliggörande och budgivning av offentliga upphandlingar. Datamängden består av titlar, beskrivningar samt tillhörande ämneskategorier för offentliga upphandlingar inom Sverige, tagna från e-Avrops webtjänst. När texterna är märkta med ett flertal kategorier, föreslås en algoritm baserad på ett djupt artificiellt neuronnät med sekventiell bearbetning, där en mängd klassificeringsmodeller används. Varje sådan modell använder en av de märkta kategorierna tillsammans med den tillhörande texten, som skapar en mängd av text - kategori par. Målet är att utreda huruvida dessa klassificerare kan uppvisa olika former av uppsåt som teoretiskt sett borde vara medfört från de olika datamängderna modellerna mottagit.
Jmila, Houda. „Dynamic resource allocation and management in virtual networks and Clouds“. Thesis, Evry, Institut national des télécommunications, 2015. http://www.theses.fr/2015TELE0023/document.
Der volle Inhalt der QuelleCloud computing is a promising technology enabling IT resources reservation and utilization on a pay-as-you-go manner. In addition to the traditional computing resources, cloud tenants expect compete networking of their dedicated resources to easily deploy network functions and services. They need to manage an entire Virtual Network (VN) or infrastructure. Thus, Cloud providers should deploy dynamic and adaptive resource provisioning solutions to allocate virtual networks that reflect the time-varying needs of Cloud-hosted applications. Prior work on virtual network resource provisioning only focused on the problem of mapping the virtual nodes and links composing a virtual network request to the substrate network nodes and paths, known as the Virtual network embedding (VNE) problem. Little attention was paid to the resource management of the allocated resources to continuously meet the varying demands of embedded virtual networks and to ensure efficient substrate resource utilization. The aim of this thesis is to enable dynamic and preventive virtual network resources provisioning to deal with demand fluctuation during the virtual network lifetime, and to enhance the substrate resources usage. To reach these goals, the thesis proposes adaptive resource allocation algorithms for evolving virtual network requests. We adress the extension of an embedded virtual node requiring more resources and consider the substrate network profitability. We also deal with the bandwidth demand variation in embedded virtual links. We first provide a heuristic algorithm to deal with virtual nodes demand fluctuation. The work is extended by designing a preventive re-configuration scheme to enhance substrate network profitability. Finally, a distributed, local-view and parallel framework was devised to handle embedded virtual links bandwidth fluctuations. The approach is composed of a controller and three algorithms running in each substrate node in a distributed and parallel manner. The framework is based on the self-stabilization approach, and can manage various forms of bandwidth demand variations simultaneously
Uhrín, Peter. „Počítání unikátních aut ve snímcích“. Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445493.
Der volle Inhalt der QuelleSarti, Paolo. „Embeddings for text classification with recurrent neural networks“. Master's thesis, Alma Mater Studiorum - Università di Bologna, 2018.
Den vollen Inhalt der Quelle findenChen, Hsin-Ping, und 陳心萍. „Field-aware Network Embedding on Heterogeneous Networks“. Thesis, 2017. http://ndltd.ncl.edu.tw/handle/sp22nw.
Der volle Inhalt der Quelle國立臺灣大學
資訊網路與多媒體研究所
105
Network embedding is used for extracting the feature representations of a network and benefits many machine learning tasks, such as classification, link prediction, etc. This model embeds the interactions among the vertices into the low-dimension representations, which greatly preserve the relations of the vertices. However, to simplify the learning procedure, most previous work treats all the vertices as the same type and thus ignores the interaction type of two vertices in different fields. In the light of this, we propose a field-aware network embedding model which can separately embed the distinct kinds of the interactions into the learned representations. Our experimental results show that integrating such field-aware information indeed improves the performance of the state-of-the-art network embedding algorithm.
WU, MING-LUN, und 吳明倫. „Network embedding on hypercubes“. Thesis, 1992. http://ndltd.ncl.edu.tw/handle/27221324163523479154.
Der volle Inhalt der QuelleChen, Hsi-Wen, und 陳璽文. „Streaming Network Embedding with Memory Refreshing“. Thesis, 2019. http://ndltd.ncl.edu.tw/handle/4hh7ps.
Der volle Inhalt der Quelle國立臺灣大學
電機工程學研究所
107
Static network embedding has been widely studied to convert the sparse structure information to a dense latent space for various applications. However, real networks are continuously evolving, and deriving the whole embedding for every snapshot is computationally intensive. In this paper, therefore, we explore streaming network embedding to 1) efficiently identify the nodes required to update the embeddings under multi-type network changes and 2) carefully revise the embeddings to maintain transduction over different parts of the network. Specifically, we propose a new representation learning framework, named Graph Memory Refreshing (GMR), to preserve both structural information and embedding consistency for streaming network embedding. We prove that GMR is more consistent than other state-of-the-art methods. Experimental results manifest that GMR outperforms the baselines in both the accuracy and the running time.
Ferrolho, Luís Xavier Mimoso. „Secure and dependable virtual network embedding“. Master's thesis, 2016. http://hdl.handle.net/10451/25620.
Der volle Inhalt der QuelleA virtualização de redes tornou-se uma técnica poderosa que permite que várias redes virtuais, criadas por diferentes utilizadores, operem numa infraestrutura partilhada. Com o avanço de tecnologias como Redes Definidas por Software1, a virtualização de redes ganhou um novo ímpeto e tornou-se uma funcionalidade central em ambientes de computação em nuvem. Um dos grandes desafios que a virtualização de redes apresenta é como utilizar de forma eficiente os recursos oferecidos pelas redes físicas dos fornecedores de infraestruturas, nomeadamente os nós - entidades de uma rede com capacidade computacional – e ligações – entidades de uma rede que transportam dados entre pares de nós. De forma a resolver este problema, vários trabalhos da área de virtualização de redes têm sido desenvolvidos [1]. Em particular, têm sido propostos algoritmos que encontram formas eficazes para decidir onde mapear os nós e as ligações virtuais na rede física. Estes algoritmos podem assumir uma de três aproximações diferentes: soluções exatas, que resolvem pequenas instâncias do problema e encontram soluções ótimas para a localização dos recursos virtuais na rede física; soluções baseadas em heurísticas, que se focam em obter um bom resultado, próximo do ótimo, em pouco tempo; e meta-heurísticas, que usam técnicas específicas independentes do problema para achar um resultado próximo do ótimo. Tipicamente o objetivo destes algoritmos é achar estes mapeamentos tendo em conta determinadas métricas, como qualidade de serviço, custos económicos ou confiabilidade. Neste contexto, uma das métricas menos exploradas é a garantia da segurança das redes virtuais, um tema que é cada vez mais importante, especialmente em ambientes de computação em nuvem. As plataformas de virtualização propostas recentemente dão aos utilizadores a liberdade para especificarem de forma arbitrária as topologias virtuais para as suas redes e esquemas de endereçamento. Estas plataformas têm sido desenvolvidas considerando apenas um provedor de nuvem, forçando os clientes a confiarem que este provedor mantém os seus dados e cargas de trabalho seguros e disponíveis. Infelizmente, existem evidências de que problemas nestes ambientes ocorrem, tanto de natureza maliciosa (ataques causados através de algum elemento corrompido na rede) como benigna (falhas em elementos individuais da rede, ou falhas causadas, por exemplo, por catástrofes, afetando vários elementos da rede em simultâneo) [2]. Deste modo, nesta tese defendemos que a segurança e a confiabilidade são dois fatores críticos e, por isso, devem ser considerados durante o processo de mapeamento das redes virtuais. Nesse sentido, neste trabalho definimos um problema denominado Mapeamento de Redes Virtuais Seguro e Confiável, e construímos um algoritmo que resolve este problema num ambiente constituído por várias nuvens (i.e., múltiplos provedores de recursos físicos). Ao considerar-se um ambiente como este, evita-se que o cliente fique restringido a apenas um provedor, aumentando a possibilidade de a sua rede e o seu serviço resistirem a falhas em elementos da rede física ou interrupções numa nuvem, através da replicação dos serviços por diversas nuvens. A segurança das redes virtuais também é melhorada na medida em que os serviços mais sensíveis podem ser colocados em nuvens que oferecem maiores garantias de segurança. O problema em si tem como principal objetivo mapear redes virtuais sobre a rede física, distribuída potencialmente por diferentes nuvens, utilizando a menor quantidade de recursos, e satisfazendo, ao mesmo tempo, os seguintes requisitos: (i) cada nó e ligação virtual é mapeado na rede física satisfazendo os requisitos de capacidade de computação e de largura de banda, respetivamente, e também os requisitos de segurança e confiabilidade associados; (ii) cada nó virtual ´e mapeado num nó físico cuja localização satisfaz os requisitos do primeiro (isto é, se por exemplo um nó virtual procura uma nuvem que forneça um nível de máxima segurança, o nó físico que será alocado tem de pertencer a uma nuvem com essa característica); (iii) a rede virtual está protegida contra erros na rede física ou disrupção numa nuvem, de modo a cumprir os requisitos de confiabilidade. O algoritmo que apresentamos nesta tese cobre todos os requisitos deste problema, juntando, pela primeira vez, as propriedades segurança e confiabilidade. Adicionalmente, esta solução considera um ambiente de múltiplos domínios (neste caso, múltiplas nuvens), de maneira a eliminar eventuais limitações que surgem quando se usa um único provedor de nuvem. A solução criada é uma solução exata, desenvolvida através de uma técnica de otimização de programação inteira mista, e tem como objetivo minimizar os custos de mapeamento de redes virtuais, cobrindo sempre os seus requisitos de segurança e confiabilidade. Nesta solução são definidas diversas restrições que têm de ser cumpridas para que uma rede virtual possa ser mapeada sobre uma rede física. O nosso algoritmo oferece vários níveis de segurança e confiabilidade que podem ser escolhidos na definição das redes virtuais, nomeadamente associados aos nós e às ligações que as compõem. O cliente pode escolher arbitrariamente que níveis deseja para cada recurso virtual, para além de poder especificar também a topologia da sua rede e os requisitos de capacidade de computação e largura de banda para os nós e ligações, respetivamente. Sumariamente, nesta tese consideramos que são suportados vários níveis de segurança para os nós e ligações virtuais, que vão desde segurança por omissão, isto é, garantias mínimas de segurança, até à inclusão de mecanismos criptográficos que garantem maior segurança. Em relação à confiabilidade, os clientes podem optar por adicionar redundância aos seus recursos virtuais de modo a tolerar falhas. Quando é requisitada redundância, os clientes podem escolher, para cada nó virtual, se desejam a respetiva reserva adicional na mesma nuvem onde se encontra o nó primário, tolerando apenas falhas locais, ou localizada noutra nuvem, com o intuito de aumentar a probabilidade de a sua rede virtual sobreviver a uma disrupção¸ ao de uma nuvem. Na nossa solução, as nuvens são também distinguidas entre si consoante o nível de confiança que fornecem ao cliente. Podem ser consideradas nuvens públicas (pertencentes a provedores), privadas (pertencentes aos próprios clientes), entre outras. A definição de diferentes tipos de nuvem dá a possibilidade ao cliente de escolher as nuvens consoante a sensibilidade da sua informação. Nesta tese é ainda apresentada uma interface de programação de aplicações, que fornece como funcionalidade o mapeamento de redes virtuais segura e confiável, e que pode ser utilizada por plataformas de virtualização que tenham em conta ambientes de múltiplos domínios [3]. Quanto aos resultados, quando segurança e confiabilidade são requisitadas pelas redes virtuais, os mesmos mostram que existe um custo adicional (já esperado) para fornecer estas propriedades. No entanto, um ligeiro ajuste no preço dos recursos permite aos fornecedores de infraestruturas que fornecem segurança e confiabilidade obter um lucro semelhante (ou superior) ao dos fornecedores que não fornecem este tipo de propriedades. Os resultados mostram ainda que o nosso algoritmo se comporta de maneira similar ao algoritmo mais utilizado para mapeamento de redes virtuais, D-ViNE [4, 5], quando os requisitos de segurança e confiabilidade não são considerados. Apesar de serem uma boa base para novos trabalhos na área, as soluções exatas Não escalam (este tipo de soluções apenas consegue resolver problemas num tempo razoável se estes forem de pequena escala). Deste modo, como trabalho futuro, o primeiro caminho a tomar será o desenvolvimento de uma heurística que garanta as propriedades de segurança e confiabilidade.
Network virtualization is emerging as a powerful technique to allow multiple virtual networks (VN), eventually specified by different tenants, to run on a shared infrastructure. With the recent advances on Software Defined Networks (SDN), network virtualization – traditionally limited to Virtual Local Area Networks (VLAN) – has gained new traction. A major challenge in network virtualization is how to make efficient use of the shared resources. Virtual network embedding (VNE) addresses this problem by finding an effective mapping of the virtual nodes and links onto the substrate network (SN). VNE has been studied in the network virtualization literature, with several different algorithms having been proposed to solve the problem. Typically, these algorithms address various requirements, such as quality of service (QoS), economic costs or dependability. A mostly unexplored perspective on this problem is providing security assurances, a gap increasingly more relevant to organizations, as they move their critical services to the cloud. Recently proposed virtualization platforms give tenants the freedom to specify their network topologies and addressing schemes. These platforms have been targeting only a datacenter of a single cloud provider, forcing complete trust on the provider to run the workloads correctly and limiting dependability. Unfortunately, there is increasing evidence that problems do occur at a cloud scale, of both malicious and benign natures. Thus, in this thesis we argue that security and dependability is becoming a critical factor that should be considered by VNE algorithms. Motivated by this, we define the secure and dependable VNE problem, and design an algorithm that addresses this problem in multiple cloud environments. By not relying on a single cloud we avoid internet-scale single points of failures, ensuring the recovery from cloud outages by replicating workloads across providers. Our solution can also enhance security by leaving sensitive workloads in more secure clouds: for instance, in private clouds under control of the user or in facilities that employ the required security features. The results from our experiments show that there is a cost in providing security and availability that may reduce the provider profit. However, a relatively small increase in the price of the richer features of our solution (e.g., security resources) enables the provider to offer secure and dependable network services at a profit. Our experiments also show that our algorithm behaves similarly to the most commonly used VNE algorithm when security and dependability are not requested by VNs.
Lee, Chen-Hsuan, und 李承軒. „A Network Embedding on Phone Call Graph“. Thesis, 2018. http://ndltd.ncl.edu.tw/handle/5299zz.
Der volle Inhalt der Quelle國立臺灣大學
資訊工程學研究所
106
This paper introduces network embedding into phone call graph which is more useful in many AI tasks than extracts features manually. However, most of existing methods of network embedding could not precisely capture all of the information of the phone call graph. In this paper, we propose a new perspective for phone call graph embedding called Phone2vec, which optimizes a new loss function with call frequency and call duration considered. The experiment results and the further analysis show that the proposed method capture both attribute indeed and makes a substantial improvement against the state-of-the-art baselines.
Chen, Han-Hao, und 陳翰浩. „Knowledge Graph Embedding by Adversarial Probabilistic Network“. Thesis, 2018. http://ndltd.ncl.edu.tw/handle/4k4da2.
Der volle Inhalt der Quelle國立臺灣大學
資訊工程學研究所
106
This work studies the problem of embedding knowledge graph into low-dimensional vector space, which is very useful in many AI tasks. However, most existing methods could not precisely and flexibly characterize knowledge graph in its relation mapping properties such as one-to-many, many-to-one, and many-to-many, and could not efficiently find extra hidden relative entities for a given relationship. In this work, we propose a novel perspective for knowledge graph embedding by maximizing the probability of observed graph named ”TransPN”, which can well preserve the variety of complex relations by using the bidirectional translation and dynamical relation projection. Moreover, we are the first to introduce virtual adversarial training to enhance the robustness of our embedding results named ”TransPN-Adv”. The experiment results show that the proposed method makes a substantial improvement against the state-of-the-art baselines.
Esposito, Flavio. „A policy-based architecture for virtual network embedding“. Thesis, 2014. https://hdl.handle.net/2144/14273.
Der volle Inhalt der Quelle劉冠逸. „Virtual Network Embedding Algorithm with Minimized Path Length“. Thesis, 2014. http://ndltd.ncl.edu.tw/handle/51425096344595948259.
Der volle Inhalt der Quelle國立清華大學
資訊工程學系
103
Network virtualization is a technology which allows multiple heterogeneous virtual networks (VNs) to coexist on one substrate network (SN) at the same time and makes the internet more flexible and manageable. The main challenge for network virtualization is how to map a VN to a SN efficiently, which is known as the virtual network embedding (VNE) problem. VNE problem is proved as an NP-Hard problem, previous works have presented several heuristic algorithms to solve VNE problem. In this thesis, we present a virtual network embedding algorithm which is focus on minimizing the average path length of the virtual links. Unlike the two-stage algorithm, our algorithm adopts node mapping and link mapping in the same time. Our algorithm maps the largest adjacent bandwidth virtual node to SN then map the virtual links to the substrate shortest paths which has the maximum bottleneck bandwidth. Simulation results show that our algorithm has better mapping successful rate and shorter average path length of the virtual links than others.