全部 |
  • 全部
  • 题名
  • 作者
  • 机构
  • 关键词
  • NSTL主题词
  • 摘要
检索 二次检索 AI检索
外文文献 中文文献
筛选条件:

1. Edge computing network resource allocation based on virtual network embedding NSTL国家科技图书文献中心

Keqiang Zhan |  Ning Chen... -  《International journal of communication systems》 - 2025,38(1) - e5344.1~e5344.13 - 共13页 - 被引量:11

摘要: on the above inspirations, we adopt virtual network | , network virtualization (NV) is widely applied to |  increase the flexibility of network architectures. Based |  embedding (VNE) to make decisions on the resource |  reinforcement learning (DRL)-based multi-layer policy network
关键词: 6G |  deep reinforcement learning |  edge computing |  network virtualization |  resource allocation |  virtual network embedding

2. A dynamic Al-based algorithm selection for Virtual Network Embedding NSTL国家科技图书文献中心

Abdelmounaim Bouroud... |  Abdelkader Outtagart...... -  《Annals of telecommunications》 - 2025,80(3/4) - 265~281 - 共17页

摘要: heterogeneity of network infrastructures, the need for Virtual |  Network Embedding (VNE) is becoming more critical than |  ever. VNE consists of mapping virtual networks on top |  of the physical infrastructure to optimize network |  resource use and improve overall network performance
关键词: Virtual Network Embedding |  AI |  Deep reinforcement learning |  Algorithm selection |  B5G/6G

3. Distributed Dynamic Virtual Network Embedding in Container Networks NSTL国家科技图书文献中心

Donglai Wang |  Weibei Fan... -  《Wireless Artificial Intelligent Computing Systems and Applications,Part II》 -  International Conference on Wireless Artificial Intelligent Computing Systems and Applications - 2025, - 205~215 - 共11页

摘要:In data center network virtualization, the |  in virtual node requirements which is crucial for |  ill-suited for practical network virtualization |  microservice applications. It allows a virtual node to be |  virtual requests by more than 10% while paying less cost.
关键词: Virtual network embedding |  Parallel computing |  Containerization |  Microservice

4. A framework of survivability model virtualized wireless sensor networks for IOT-assisted wireless sensor network NSTL国家科技图书文献中心

Bere Sachin Sukhadeo |  Sarika Dilip Dhurgud...... -  《Internet Technology Letters》 - 2025,8(2) - e552.1~e552.6 - 共6页

摘要: virtual network embedding. WSNs can leverage their |  mapping more virtual network embedding (VNE) onto their |  study considered both the node-level and network-level |  shared sensing capabilities through network | Using traditional non-virtualized Wireless
关键词: internet of things |  survivability |  virtual network embedding |  wireless sensor networks

5. PASE: Pro-active Service Embedding in The Mobile Edge NSTL国家科技图书文献中心

Oleg Kolosov |  Gala Yadgar... -  《Journal of network and systems management》 - 2025,33(1) - 3.1~3.31 - 共31页

摘要: allocation strategy for virtual-network function placement | Mobile edge computing offers ultra-low latency | , high bandwidth, and high reliabil-ity. Thus, it can |  support a plethora of emerging services that can be |  placed in close proximity to the user. One of the
关键词: Virtual network embedding |  Edge computing

6. SAST-VNE: A Flexible Framework for Network Slicing in 6G Integrated Satellite-Terrestrial Networks NSTL国家科技图书文献中心

Mario Minardi |  Youssouf Drif... -  《IEEE Journal on Selected Areas in Communications》 - 2025,43(1) - 234~244 - 共11页

摘要:-Hard problem, typically also known as Virtual Network | Network slicing (NS) is one of the key |  network that is more heterogeneous, due to the full |  describes the process of accommodating virtual networks |  Embedding (VNE). Existing VNE solutions are designed per
关键词: Substrates |  Space-air-ground integrated networks |  Satellites |  6G mobile communication |  Handover |  Costs |  Minimization

7. Research on 3D advertising placement based on virtual reality simulation NSTL国家科技图书文献中心

Lijing Xu -  《Internet Technology Letters》 - 2025,8(1) - e463.1~e463.6 - 共6页

摘要:Virtual reality based on computer 3D |  article proposes a graph convolutional network with |  multi-head attention embedding for 3D advertising |  user behavior and multi-feature embedding mapping. To |  mechanism is embedded in the graph convolutional network
关键词: advertising placement |  computer 3D technology |  multi-head attention |  virtual reality

8. Skeleton-based action recognition through attention guided heterogeneous graph neural network NSTL国家科技图书文献中心

Li T. |  Geng P.... -  《Knowledge-based systems》 - 2025,309(Jan.30) - 1.1~1.12 - 共12页

摘要: Attention Guided Heterogeneous Graph Neural Network (AG |  are represented as actual and virtual edges | , respectively. Vertices and actual or virtual edges constitute |  actual and virtual metapaths, respectively. To |  joints by introducing the rotary position embedding
关键词: Graph neural network |  Heterogeneous graph |  Self-attention mechanism |  Skeleton-based action recognition

9. Secure and Intelligent Sensing in Unmanned Aerial Vehicles: A Semi-Supervised Modulation Recognition Framework NSTL国家科技图书文献中心

Cai, Yilin |  Li, Dingzhao... -  《IEEE sensors journal》 - 2025,25(5) - 8975~8987 - 共13页

摘要: (Semi-AMR) method incorporating virtual adversarial | , particularly for unlabeled data. This allows the network to |  project signals into an embedding space where | Unmanned aerial vehicles (UAVs) leverage |  various wireless communication systems for efficient
关键词: Convolutional neural networks |  Autonomous aerial vehicles |  Modulation |  Accuracy |  Sensors |  Training |  Signal to noise ratio |  Feature extraction |  Convolution |  Spectrogram...

10. Adaptive Generation of Privileged Intermediate Information for Visible-Infrared Person Re-Identification NSTL国家科技图书文献中心

Mahdi Alehdaghi |  Arthur Josi... -  《IEEE transactions on information forensics and security》 - 2025,20 - 3400~3413 - 共14页

摘要: captured over a distributed network of RGB and IR sensors |  a virtual domain that bridges discriminative |  compared to the V domain. Meanwhile, the embedding module | Visible-infrared person re-identification (V-I |  ReID) seeks to retrieve images of the same individual
关键词: Feature extraction |  Training |  Cameras |  Bridges |  Identification of persons |  Generators |  Data mining |  Computational modeling |  Adaptation models |  Accuracy