4.5 Article Proceedings Paper

Techniques and algorithms for access control list optimization

期刊

COMPUTERS & ELECTRICAL ENGINEERING
卷 35, 期 4, 页码 556-566

出版社

PERGAMON-ELSEVIER SCIENCE LTD
DOI: 10.1016/j.compeleceng.2008.08.003

关键词

Access control lists; Data networks optimization; Network security

向作者/读者索取更多资源

Access control lists are core features of today's internetwork routers. They serve several purposes, most notably in filtering network traffic and securing critical networked resources. However, the addition of access control lists increases packet latency due to the overhead of extra computations involved. This paper presents simple techniques and algorithms for optimizing access control lists that can reduce significantly expected packet latencies without sacrificing security requirements. The emphasis throughout the paper is in providing a modular approach that can be implemented either fully or partially, both online and offline, based on the amount of overhead allowed. it also shows empirically and analytically where and why the greatest potential for optimization lies. (C) 2008 Elsevier Ltd. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
Article Computer Science, Hardware & Architecture

Discovering e-commerce user groups from online comments: An emotional correlation analysis-based clustering method

Jia Ke, Ying Wang, Mingyue Fan, Xiaojun Chen, Wenlong Zhang, Jianping Gou

Summary: This study integrates the emotional correlation analysis model and Self-organizing Map (SOM) to construct fine-grained user emotion vector based on review text and perform visual cluster analysis, which helps platform merchants quickly mine user clustering and characteristics.

COMPUTERS & ELECTRICAL ENGINEERING (2024)

Article Computer Science, Hardware & Architecture

Multilevel-based algorithm for hyperspectral image interpretation

Shi Qiu, Huping Ye, Xiaohan Liao, Benyue Zhang, Miao Zhang, Zimu Zeng

Summary: This paper proposes a multilevel-based algorithm for hyperspectral image interpretation, which achieves semantic segmentation through multidimensional information fusion, and introduces a context interpretation module to improve detection performance.

COMPUTERS & ELECTRICAL ENGINEERING (2024)

Article Computer Science, Hardware & Architecture

Maximizing the profit of omnichannel closed-loop supply chains with mean-variance criteria

Jianteng Xu, Qingguo Bai, Zhiwen Li, Lili Zhao

Summary: This study constructs two optimization models for the omnichannel closed-loop supply chain by leveraging the combined power of leader-follower game and mean-variance theories. The focus is on analyzing the performance of manufacturers who distribute products through physical stores. The results show that the risk-averse attitude of the physical store has a positive impact on the overall system profitability, but if the introduced physical store belongs to another firm, total profit experiences a decline.

COMPUTERS & ELECTRICAL ENGINEERING (2024)

Article Computer Science, Hardware & Architecture

GraphPhys: Facial video-based physiological measurement with graph neural network

Jiahao Xiong, Weihua Ou, Zhonghua Liu, Jianping Gou, Wenjun Xiao, Haitao Liu

Summary: This paper proposes a novel remote photoplethysmography framework, named GraphPhys, which utilizes graph neural network to extract physiological signals and introduces Average Relative GraphConv for the task of remote physiological signal measurement. Experimental results show that the methods based on GraphPhys significantly outperform the original methods.

COMPUTERS & ELECTRICAL ENGINEERING (2024)

Article Computer Science, Hardware & Architecture

User financial credit analysis for blockchain regulation

Zhiyao Tong, Yiyi Hu, Chi Jiang, Yin Zhang

Summary: The rise of illicit activities involving blockchain digital currencies has become a growing concern. In order to prevent illegal activities, this study combines financial risk control with machine learning to identify and predict the risks of users with poor credit. Experimental results demonstrate high performance in user financial credit analysis.

COMPUTERS & ELECTRICAL ENGINEERING (2024)