[1]谢逸,唐成华,黄向农.双层隐马尔可夫链的突发流合成[J].智能系统学报,2012,7(2):108-114.
 XIE Yi,TANG Chenghua,HUANG Xiangnong.A doubly hidden Markov model for synthesizing bursty workloads[J].CAAI Transactions on Intelligent Systems,2012,7(2):108-114.
点击复制

双层隐马尔可夫链的突发流合成

参考文献/References:
[1]PAXSON V, FLOYD S. Wide area traffic: the failure of Poisson modeling[J]. IEEE/ACM Transactions on Networking (ToN), 1995, 3(3): 244.
[2]LELAND W, TAQQU M, WILLINGER W, et al. On the selfsimilar nature of Ethernet traffic[J]. IEEE/ACM Transactions on Networking, 2002, 2(1): 115. 
[3]BERAN J, SHERMAN R, TAQQU M, et al. Long range dependence in variable bit rate video traffic[J]. IEEE Trans on Communication, 1995, 43: 15661579.
[4]ZVIRONIENE A, NAVICKAS Z, RINDZEVICIUS R. Bursty traffic simulation by ONOFF model[J]. Electronics and Electrical Engineering, 2006, 70(6): 6568. 
[5]RIEDI R, CROUSE M, RIBEIRO V, et al. A multifractal wavelet model with application to network traffic[J]. IEEE Transactions on Information Theory, 2002, 45(3): 9921018.
[6]NORROS I. On the use of fractional Brownian motion in the theory of connectionless networks[J]. IEEE Journal on Selected Areas in Communications, 2002, 13(6): 953962.
[7]ABRY P, BARANIUK R, FLANDRIN P, et al. The multiscale nature of network traffic: discovery, analysis, and modeling[J]. IEEE Signal Processing Magazine, 2002(19): 2846.
[8]NISHIMURA S, SHINNO M. Modeling burst traffic using a MAP with a tree structure[J]. Journal of the Operations Research, 2004, 47(3): 129144. 
[9]ANDERSSON M, CAO J, KIHL M, et al. Performance modeling of an Apache web server with bursty arrival traffic[EB/OL].[20110618]. http://lup.lub.lu.se/luur/download?func=downloadFile&recordOId=532529&fileOId=625324.
[10]KONTOVASILIS K, MITROU N. Bursty traffic modeling and efficient analysis algorithms via fluidflow models for ATM IBCN[J]. Annals of Operations Research, 1994, 49(1): 279323.
[11]LIU P, CHEUNG W, LI K. On the modeling of bursty traffic[C]//Proceedings on Computer, Communication, Control and Power Engineering. Beijing, China, 2002: 220223.
[12]JOHNSON M. Why doesn’t EM find good HMM POStaggers[C]//Proceedings of the 2007 Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning (EMNLPCoNLL). Prague, Czech Republic, 2007: 296305.
[13]FINE S, SINGER Y, TISHBY N. The hierarchical hidden Markov model: analysis and applications[J]. Machine Learning, 1998, 32(1): 4162.
[14]RABINER L. A tutorial on hidden Markov models and selected applications in speech recognition[J]. Proceedings of the IEEE, 1989, 77(2): 257286. 
相似文献/References:
[1]王策,姬晓飞,李一波.一种简便的视角无关动作识别方法[J].智能系统学报,2014,9(5):577.[doi:10.3969/j.issn.1673-4785.201307057]
 WANG Ce,JI Xiaofei,LI Yibo.Study on a simple view-invariant action recognition method[J].CAAI Transactions on Intelligent Systems,2014,9():577.[doi:10.3969/j.issn.1673-4785.201307057]
[2]李海青,李永福,郑太雄,等.复杂交通环境下智能车辆避障方法研究[J].智能系统学报,2023,18(6):1275.[doi:10.11992/tis.202210033]
 LI Haiqing,LI Yongfu,ZHENG Taixiong,et al.Obstacle avoidance method for intelligent vehicles in complex environments[J].CAAI Transactions on Intelligent Systems,2023,18():1275.[doi:10.11992/tis.202210033]

备注/Memo

收稿日期:2011-11-14.
网络出版日期:2012-03-09.
基金项目:国家自然科学基金资助项目(60970146);教育部博士点专项基金资助项目(20090171120001);中央高校基本科研业务费专项资金资助项目(11lgpy38).
通信作者:谢逸.????????????E-mail:xieyi5@mail.sysu.edu.cn.
作者简介:
谢逸,男,1973年生,讲师,博士,主要研究方向为计算机网络与通信.发表学术论文20余篇,其中多篇被SCI、EI检索.
?唐成华,男,1974年生,副教授,博士,主要研究方向为智能信息处理、网络信息安全等,发表学术论文30余篇,被EI检索13篇.
黄向农,男,1958年生,工程师,主要研究方向为计算机网络应用技术.

更新日期/Last Update: 2012-07-12
Copyright © 《 智能系统学报》 编辑部
地址:(150001)黑龙江省哈尔滨市南岗区南通大街145-1号楼 电话:0451- 82534001、82518134 邮箱:tis@vip.sina.com