Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China,Graduate University of Chinese Academy of Sciences, Beijing, China
virtual data plane;packet processing;data plane;hardware data plane;VDP instance;scalable virtual hardware data;virtual hardware data plane;customized packet processing;packet acquisition overhead;multiple VDP
Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China,Graduate University of Chinese Academy of Sciences, Beijing, China
virtual data plane;packet processing;data plane;hardware data plane;VDP instance;scalable virtual hardware data;virtual hardware data plane;customized packet processing;packet acquisition overhead;multiple VDP
Key Lab of Intelligent Information Processing, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China,University of Chinese Academy of Sciences, Beijing, China
video clip;grassmannian manifold;local linear discriminant analysis;multiple video clip;testing video frame;video surveillance scenario;classic method;competitive method;novel method;proposed PaLo-LDA method
Key Lab of Intelligent Information Processing, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China,University of Chinese Academy of Sciences, Beijing, China
face recognition;proposed framework;unified framework;Coupling Alignments;extensive experiment;cross-view face recognition problem;cross-view matching problem;cross-view method;cross-view problem;face recognition system
Cloud Computing Research Center, North China University of Technology, Beijing, China,Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China
service operation;runtime monitoring;service monitoring;domain user;service provider;business-oriented service monitoring metamodel;monitoring model;monitoring process;multifold monitoring;service monitoring approach
Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China,University of Chinese Academy of Sciences, Beijing, China
arbitrary speed;speed scaling;energy-efficient algorithm;adjacent speed ratio;case task;distinct speed;task assignment;task scheduling;execution time;execution time constraint
State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, China,Graduate University of Chinese Academy of Sciences, Beijing, China
F-FCSR-H v3;F-FCSR-H v2;probability distribution;F-FCSR-H v3F-FCSR-H v2;homogeneous Markov chain;M. Hell;T. Johansson;probability model;success probability;theoretical probability
Institute of Software, Chinese Academy of Sciences, Beijing, China, Graduate University of Chinese Academy of Sciences, Beijing, China
social media;social media service;experimental result;sub system;active replication approach;active replication approach Pyxis;adaptive approach;newly-built social media service;content-based subscription language;subscription load
SKLOIS, Institute of Software, Chinese Academy of Sciences, Beijing, China,Graduate University of Chinese Academy of Sciences, Beijing, China
embedding degree;Tate pairing;tate pairing computation;loop iteration;twisted Jacobi intersections curve;Selmer curves case;efficient pairing calculation;new pairing;KSS curve;twisted Edwards
The State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing, China,Graduate University of the Chinese Academy of Sciences, Beijing, China
cost-based framework;JFKi protocol;analysis result;known analysis model;framework models intruder;DoS attack;DoS-resistent protocol;flexible tolerance relation;broad form;concrete value