Computer Science ›› 2021, Vol. 48 ›› Issue (9): 278-285.doi: 10.11896/jsjkx.201200056
• Computer Network • Previous Articles Next Articles
XIA Zhong, XIANG Min, HUANG Chun-mei
CLC Number:
[1]HUANG K Q,CHEN X T,KANG Y F,et al.Overview of Intelligent Video Surveillance Technology[J].Chinese Journal of Computers,2015,38(6):1093-1118. [2]ZHU X,DENG H T,CHEN Z,et al.Design of Large-Scale Vi-deo Surveillance System Based on P2P Streaming[C]//2011 3rd International Workshop on Intelligent Systems and Applications.Wuhan:IEEE,2011:1-4. [3]KUNWAR P,MAHESH C G,MUSHTAQ A.Priority-basedscheduling scheme for live video streaming in peer-to-peer network[J].Multimedia Tools and Applications,2018,77(18):24427-24457. [4]RUSSO A,LO C R.Delay-aware push/pull protocols for live video streaming in p2p systems[C]//IEEE International Conference on Communications.Cape Town:IEEE,2010:3-7. [5]LI M F.Queueing Analysis of Unicast IPTV With AdaptiveModulation and Coding in Wireless Cellular Networks[J].IEEE Transactions on Vehicular Technology,2017,66(10):9241-9253. [6]LIANG C,TAN Y,ZHANG X S,et al.Building packet length convert channel over mobile VoIP traffics[J].Journal of Network and Computer Applications,2018,118(15):144-153. [7]LI L F,ZHANG J Z,WANG P D,et al.P2P network searchmechanism based on node interest and Q-learning[J].Computer Science,2020,47(2):221-226. [8]LI W X,XIONG Q G,YANG L T.A DHT overlay network that realizes efficient copy publishing and query[J].Computer Science,2010,37(7):87-90. [9]ZENG B,WANG R.A novel lookup and routing protocol based on CAN for structured P2P network[C]//1st IEEE Internatio-nal Conference on Computer Communication and the Internet (ICCCI).Wuhan:IEEE,2016:6-9. [10]AZMY N,MERZ S,WEIDENBACH C.A machine-checked correctness proof for Pastry[J].Science of Computer Programming,2018,158:64-80. [11]CHERBAL S,BOUKERRAM A,BOUBETRA A.A survey of DHT solutions in fixed and mobile networks[J].International Journal of Communication Networks and Distributed Systems,2016,17(1):14-42. [12]SAH A,HWANG I S,RIANTO A,et al.Gnutella-Based P2PApplications for SDN over TWDM-PON Architecture[J].International Journal of Computer Theory and Engineering,2020,12(2):32-39. [13]YAN Y,TANG H.Data collection and analysis of traffic be-tween nodes in BitTorrent network[J].Computer Science,2014,41(6):75-78. [14]KISEMBE P,JEBERSON W.Future of Peer-To-Peer Technology with the Rise of Cloud Computing[J].International Journal of Peer to Peer Networks (IJP2P),2017,8(2/3):45-54. [15]ZHENG Z,WANG Y J,MA X K.Laurel:A Hybrid Data Distribution Coverage Network[J].Journal of Software,2011,22(4):722-735. [16]MAHESWARI B U,SUDARSHAN T S B.Reputation basedmesh-tree-mesh cluster hybrid architecture for P2P live strea-ming[C]//Proceedings of the 3rd International Conference on Devices,Circuits and Systems.Coimbatore:IEEE,2016:240-243. [17]JAHROMI N T,AKBARI B,MOVAGHAR A.A hybrid mesh-tree peer-to-peer overlay structure for layered video streaming[C]//2010 5th International Symposium on Telecommunications.Tehran:IEEE,2010,706-709. [18]AMAD M,MEDDAHI A,AISSANI D,et al.HPM:A novelhierarchical Peer-to-Peer model for lookup acceleration with provision of physical proximity[J].Journal of Network and Computer Applications,2012,35(6):1818-1830. [19]GUPTA B,RAHIMI N,HEXMOOR H.Design of Very Efficient Lookup Algorithms for a Low Diameter Hierarchical Structured Peer-to-Peer Network[C]//16th IEEE International Conference on Industrial Informatics (INDIN).Porto:IEEE,2018:861-868. [20]HASIMOTO-BELTRAN R,LOPEZ-FUENTES F D A,VERA-LOPEZ M.Hierarchical P2P architecture for efficient content distribution[J].Peer-to-Peer Networking and Applications,2019,12(4):724-739. [21]LI J,LI C,FANG Z,et al.Optimal layer division for low latency in DHT-based hierarchical P2P network[J].International Journal of Network Management,2016,26(2):95-110. [22]MIRROKNI V,THORUP M,ZADIMOGHADDAM M.Con-sistent Hashing with Bounded Loads[C]//29th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA).New Or-leans:Society for Industrial and Applied Mathematics,2018:587-604. [23]XIANG M,JIANG Y Z,XIA Z,et al.Consistent hashing with bounded loads and virtual nodes-based load balancing strategy for proxy cache cluster[J].Cluster Computing,2020,23(4):3139-3155. [24]CHEN Y,ZHAO E D,GAO G,et al.Multi-view video wireless resource optimization[J].Chinese Journal of Computers,2020,43(3):492-511. [25]YU A J,YANG S M.Research on web server cluster load balancing algorithm in web education system[J].Journal of Supercomputing,2020,76(5):3364-3373. |
[1] | TIAN Zhen-zhen, JIANG Wei, ZHENG Bing-xu, MENG Li-min. Load Balancing Optimization Scheduling Algorithm Based on Server Cluster [J]. Computer Science, 2022, 49(6A): 639-644. |
[2] | GAO Jie, LIU Sha, HUANG Ze-qiang, ZHENG Tian-yu, LIU Xin, QI Feng-bin. Deep Neural Network Operator Acceleration Library Optimization Based on Domestic Many-core Processor [J]. Computer Science, 2022, 49(5): 355-362. |
[3] | TAN Shuang-jie, LIN Bao-jun, LIU Ying-chun, ZHAO Shuai. Load Scheduling Algorithm for Distributed On-board RTs System Based on Machine Learning [J]. Computer Science, 2022, 49(2): 336-341. |
[4] | QU Li-cheng, LYU Jiao, QU Yi-hua, WANG Hai-fei. Intelligent Assignment and Positioning Algorithm of Moving Target Based on Fuzzy Neural Network [J]. Computer Science, 2021, 48(8): 246-252. |
[5] | SONG Hai-ning, JIAO Jian, LIU Yong. Research on Mobile Edge Computing in Expressway [J]. Computer Science, 2021, 48(6A): 383-386. |
[6] | WANG Zheng, JIANG Chun-mao. Cloud Task Scheduling Algorithm Based on Three-way Decisions [J]. Computer Science, 2021, 48(6A): 420-426. |
[7] | ZHENG Zeng-qian, WANG Kun, ZHAO Tao, JIANG Wei, MENG Li-min. Load Balancing Mechanism for Bandwidth and Time-delay Constrained Streaming Media Server Cluster [J]. Computer Science, 2021, 48(6): 261-267. |
[8] | YAO Ze-wei, LIU Jia-wen, HU Jun-qin, CHEN Xing. PSO-GA Based Approach to Multi-edge Load Balancing [J]. Computer Science, 2021, 48(11A): 456-463. |
[9] | YANG Zi-qi, CAI Ying, ZHANG Hao-chen, FAN Yan-fang. Computational Task Offloading Scheme Based on Load Balance for Cooperative VEC Servers [J]. Computer Science, 2021, 48(1): 81-88. |
[10] | GUO Fei-yan, TANG Bing. Mobile Edge Server Placement Method Based on User Latency-aware [J]. Computer Science, 2021, 48(1): 103-110. |
[11] | YAO Lan, ZHAO Yong-heng, SHI Yu-qing, YU Ming-he. Highway Abnormal Event Detection Algorithm Based on Video Analysis [J]. Computer Science, 2020, 47(8): 208-212. |
[12] | GAO Zi-yan and WANG Yong. Load Balancing Strategy of Distributed Messaging System for Cloud Services [J]. Computer Science, 2020, 47(6A): 318-324. |
[13] | HUANG Mei-gen, WANG Tao, LIU Liang, PANG Rui-qin and DU Huan. Virtual Network Function Deployment Strategy Based on Software Defined Network Resource Optimization [J]. Computer Science, 2020, 47(6A): 404-408. |
[14] | ZHOU Jian-xin, ZHANG Zhi-peng, ZHOU Ning. Load Balancing Technology of Segment Routing Based on CKSP [J]. Computer Science, 2020, 47(4): 256-261. |
[15] | ZHU An-qing, LI Shuai, TANG Xiao-dong. Parallel FP_growth Association Rules Mining Method on Spark Platform [J]. Computer Science, 2020, 47(12): 139-143. |
|