Two network transformations
نویسندگان
چکیده
منابع مشابه
Witnessing Network Transformations
Software-defined networking (SDN) is transforming the way networks are managed, as fixed distributed protocols give way to flexible route calculation software. The shift brings to the forefront the issue of software errors, which may produce wrong routes, and cause significant network disruption. We propose a run-time certification mechanism that rejects any wrongly calculated route before it i...
متن کاملTwo Different Squeeze Transformations
Lorentz boosts are squeeze transformations. While these transformations are similar to those in squeezed states of light, they are fundamentally different from both physical and mathematical points of view. The difference is illustrated in terms of two coupled harmonic oscillators, and in terms of the covariant harmonic oscillator formalism. The word “squeezed state” is relatively new and was d...
متن کاملImprovements on KAMET-to-Bayesian-Network Transformations
KAMET is a model-based methodology designed to manage knowledge acquisition from multiple knowledge sources that leads to a graphical model that represents causal relations [2]. In the past, all the inference methods developed for KAMET were rule-based; and thus, produced a loss of the uncertainty information included in the models. In [3] two transformations are presented, which allow the use ...
متن کاملSecuring Network Traffic Using Genetically Evolved Transformations
The paper describes a new approach of classification using genetic programming. The proposed technique consists of genetically coevolving a population of non-linear transformations on the input data to be classified, and map them to a new space with a reduced dimension, in order to get maximum inter-classes discrimination. The classification of new samples is then performed on the transformed d...
متن کاملCorrectness Preserving Transformations for Network Protocol Compilers
Strong abstractions provide the best basis for designing network protocols, but are difficult or inefficient to implement. We claim that a network protocol specified based on strong abstractions can be transformed into an implementation based on weaker abstractions which preserves the properties of the original specification. Further, this transformation can be done automatically and will produ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Mathematics for Application
سال: 2019
ISSN: 1805-3610,1805-3629
DOI: 10.13164/ma.2019.06