Computer Science ›› 2019, Vol. 46 ›› Issue (6): 201-205.doi: 10.11896/j.issn.1002-137X.2019.06.030
Special Issue: Database Technology
Previous Articles Next Articles
YANG Rui-jun1, ZHU Ke1, CHENG Yan2
CLC Number:
[1]WANG G Q,HUANG T,LIU J,et al.A New Cache Policy Based on Sojourn Time in Content-Centric Networking[J].Chinese Journal of Computers,2015,38(3):472-482.(in Chinese) 王国卿,黄韬,刘江,等.一种基于逗留时间的新型内容中心网络缓存策略[J].计算机学报,2015,38(3):472-482. [2]ZHAO Z Q,LIU D.Web Proxy Server Cache Optimization Based on Tree Extended Naive Bayes Classifier[J].Computer Engineering,2017,43(1):115-119.(in Chinese) 赵中全,刘丹.基于树扩展朴素贝叶斯分类器的Web代理服务器缓存优化[J].计算机工程,2017,43(1):115-119. [3]HAO Y,MA T,SHEN W,et al.An Improved Web Cache Replacement Algorithm Based on Weighting and Cost[J].IEEE Access,2018,25(6):1352-1360. [4]WANG Y G,LI Z Y,WU Q H,et al.Performance Analysis and Optimization of Cache Replacement Algorithm in Information Center Network[J].Journal of Computer Research and Development,2015,52(9):2046-2055.(in Chinese) 王永功,李振宇,武庆华,等.信息中心网络内缓存替换算法性能分析与优化[J].计算机研究与发展,2015,52(9):2046-2055. [5]SHEU J P,CHUO Y C.Wildcard Rules Caching and Cache Re-placement Algorithms in Software-Defined Networking[J].IEEE Transactions on Network & Service Management,2016,13(1):19-29. [6]ZHANG J.Replacement Strategy of Web Cache Based on Data Mining[C]∥International Conference on P2p,Parallel,Grid,Cloud and Internet Computing.IEEE,2015:821-823. [7]MA T,QU J,SHEN W,et al.Weighted Greedy Dual Size Frequency based Caching Replacement Algorithm[J].IEEE Access,2018,25(6):7214-7223. [8]SAJEEV G P,SEBASTIAN M P.Comparing the Performance of Multinomial Logistic Regression and Neural Network Models in Web Cache Content Classification[C]∥International Confe-rence on Machine Learning and Computing.2011:53-58. [9]WANG Z,HE Y L.Cloud storage cache replacement scheme based on hybrid value calculation[J].Computer Engineering and Design,2017,38(6):1651-1656.(in Chinese) 王准,何元烈.基于混合价值计算的云存储缓存替换方案[J].计算机工程与设计,2017,38(6):1651-1656. [10]CHENG G,CHEN Y X.Identification method of encrypted traffic based on support vector machine[J].Journal of Southeast University(Natural Science Edition),2017,47(4):655-659.(in Chinese) 程光,陈玉祥.基于支持向量机的加密流量识别方法[J].东南大学学报(自然科学版),2017,47(4):655-659. [11]ALI F,KHAN P,RIAZ K,et al.A Fuzzy Ontology and SVM-based Web Content Classification System[J].IEEE Access,2017,24(5):25781-25797. [12]ERGUL E,ARICA N,AHUJA N,et al.Clustering Through Hybrid Network Architecture With Support Vectors[J].IEEE Transactions on Neural Networks & Learning Systems,2016,28(6):1373-1385. [13]AIMTONGKHAM P,SO-IN C,SANGUANPONG S.A novel web caching scheme using hybrid least frequently used and support vector machine[C]∥International Joint Conference on Computer Science and Software Engineering.IEEE,2016:1-6. [14]WU X,XU H,ZHU X,et al.Web Cache Replacement Strategy Based on Reference Degree[C]∥IEEE International Conference on Smart City/socialcom/sustaincom.IEEE,2015:209-212. [15]EVERT S,BARONI M.zipfR:word frequency distributions in R[C]∥Meeting of the ACL on Interactive Poster and Demonstration Sessions.Association for Computational Linguistics,2007:29-32. |
[1] | SHAN Xiao-ying, REN Ying-chun. Fishing Type Identification of Marine Fishing Vessels Based on Support Vector Machine Optimized by Improved Sparrow Search Algorithm [J]. Computer Science, 2022, 49(6A): 211-216. |
[2] | CHEN Jing-nian. Acceleration of SVM for Multi-class Classification [J]. Computer Science, 2022, 49(6A): 297-300. |
[3] | HOU Xia-ye, CHEN Hai-yan, ZHANG Bing, YUAN Li-gang, JIA Yi-zhen. Active Metric Learning Based on Support Vector Machines [J]. Computer Science, 2022, 49(6A): 113-118. |
[4] | XING Yun-bing, LONG Guang-yu, HU Chun-yu, HU Li-sha. Human Activity Recognition Method Based on Class Increment SVM [J]. Computer Science, 2022, 49(5): 78-83. |
[5] | GUO Fu-min, ZHANG Hua, HU Rong-hua, SONG Yan. Study on Method for Estimating Wrist Muscle Force Based on Surface EMG Signals [J]. Computer Science, 2021, 48(6A): 317-320. |
[6] | ZHUO Ya-qian, OU Bo. Face Anti-spoofing Algorithm for Noisy Environment [J]. Computer Science, 2021, 48(6A): 443-447. |
[7] | LEI Jian-mei, ZENG Ling-qiu, MU Jie, CHEN Li-dong, WANG Cong, CHAI Yong. Reverse Diagnostic Method Based on Vehicle EMC Standard Test and Machine Learning [J]. Computer Science, 2021, 48(6): 190-195. |
[8] | WANG You-wei, ZHU Chen, ZHU Jian-ming, LI Yang, FENG Li-zhou, LIU Jiang-chun. User Interest Dictionary and LSTM Based Method for Personalized Emotion Classification [J]. Computer Science, 2021, 48(11A): 251-257. |
[9] | CAO Su-e, YANG Ze-min. Prediction of Wireless Network Traffic Based on Clustering Analysis and Optimized Support Vector Machine [J]. Computer Science, 2020, 47(8): 319-322. |
[10] | XU Xiang-yan and HOU Rui-huan. Medium and Long-term Population Prediction Based on GM(1,1)-SVM Combination Model [J]. Computer Science, 2020, 47(6A): 485-487. |
[11] | SONG Yan, HU Rong-hua, GUO Fu-min, YUAN Xin-liang and XIONG Rui-yang. Improved SVM+BP Algorithm for Muscle Force Prediction Based on sEMG [J]. Computer Science, 2020, 47(6A): 75-78. |
[12] | FANG Meng-lin, TANG Wen-bing, HUANG Hong-yun and DING Zuo-hua. Wall-following Navigation of Mobile Robot Based on Fuzzy-based Information Decomposition and Control Rules [J]. Computer Science, 2020, 47(6A): 79-83. |
[13] | PAN Heng, LI Jing feng, MA Jun hu. Role Dynamic Adjustment Algorithm for Resisting Insider Threat [J]. Computer Science, 2020, 47(5): 313-318. |
[14] | YANG Li, LI Xin-yu, SHI Huai-feng, PAN Cheng-sheng. Task Intelligent Identification Method for Spatial Information Network [J]. Computer Science, 2020, 47(4): 262-269. |
[15] | GAO Nan,LI Li-juan,Wei-william LEE,ZHU Jian-ming. Keywords Extraction Method Based on Semantic Feature Fusion [J]. Computer Science, 2020, 47(3): 110-115. |
|