ID | 原文 | 译文 |
5004 | 在网络切片实例部署时,采用先虚拟节点映射再虚拟链路映射的两阶段部署方式。 | When deploying network slice instances, first two-phase deployment that mapping virtual nodes wasadopted, and then virtual links were mapped. |
5005 | 在虚拟节点部署阶段,首先从资源供需的角度定义了 VNF 的性能影响因子,以量化 VNF 的性能影响程度; | In the virtual nodes mapping phase, the VNF performance influences factorwas defined from the perspective of resource supply and demand to quantify the degree of VNF performance impact. |
5006 | 然后求出网络切片实例中所有 VNF 在可部署的物理服务器上的性能影响因子总和,将性能影响因子总和最小的物理服务器作为映射位置,采用模拟退火−离散粒子群算法求出节点映射结果。 | Then the sum of the performance influence factors of all VNF on the deployable physical server was found in the networkslice instance, the physical server with the smallest sum of performance influence factors was used as the mapping loca-tion, and the simulated annealing-discrete particle swarm algorithm was used to find the nodes mapping result. |
5007 | 在虚拟链路部署阶段,采用最短路径算法求出链路映射结果。 | In the vir-tual links mapping phase, the shortest path algorithm was used to obtain the link mapping result. |
5008 | 仿真结果表明,所提方法有效降低了其他网络切片实例对自身的服务性能影响。 | The simulation results show that the proposed method reduces the impact of other network slices on its own service performance. |
5009 | 针对图片转发场景下隐私泄露的问题,提出了一种跨社交网络的隐私图片分享框架,可用于图片隐私信息的延伸控制和溯源取证。 | With rapid developments of digital photography and social networks, users of photo-sharing-supported socialnetworking applications can easily forward photos across different social networks at the cost of their growing privacyconcerns. |
5010 | 延伸控制方案利用基于传播链的访问控制模型限制后续用户的操作权限,并将隐私策略嵌入图片文件,通过图片加密算法保护图片隐私信息和隐私策略的机密性、完整性,确保用户隐私策略被正确执行。 | To address this problem, a privacy-preserving photo sharing framework was proposed, which could apply toextended control and privacy invasion tracing. In extended control scheme, the following users on a dissemination chainwas restrained by each user's privacy policy. |
5011 | 该方案不受限于任何现有社交网络图片分享平台,并且能够有效防止非授权转发造成的图片隐私信息泄露威胁。 | Then several privacy areas of photos were encrypted and the access controlpolices were bound to the uploaded photos, so that any privacy areas on the photos could be hidden away from unwantedviewers even across different social networks. |
5012 | 在此基础上,溯源取证方案记录用户的操作行为,并通过嵌套签名方案防止恶意用户篡改和伪造溯源记录,为跨社交网络的图片隐私侵犯行为溯源取证提供技术手段。 | On this basis, the behaviors of users were record by tracing scheme of pri-vacy invasion, the integrality of records was protected by using nested signature algorithm. |
5013 | 实验结果验证了所提方案的有效性和效率。 | The correctness, security andperformance of overhead of the scheme are then thoroughly analyzed and evaluated via detailed simulations. |