用户名: 密码: 验证码:
基于贝叶斯网络的认知网络QoS自主控制技术研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
互联网发展至今,已经成为一个庞大的非线性动态多变的复杂系统,随着网络接入技术的日趋多样化和网络承载业务的不断丰富,传统的网络QoS管理和控制方式面临着诸多挑战。由于网络不具备自主性和智能性,网络对自己的状态和行为缺乏全面认知,网络日益复杂使得传统的孤岛式、静态式QoS保证方法表现低效且决策反应被动,网络经常拥塞,QoS性能时常劣化,业务传输与QoS保证不能根据环境的变化动态调整,全网资源利用效率低下,导致用户QoS满意度变差。认知网络是受认知无线电理论和技术的启发而提出的一种具有认知特征的主动网络,认知网络能够感知网络整体状态,据此进行计划和决策,并执行相应的动作,具有推理和学习的能力,被认为是以无线、移动、宽带和全IP化为基本特征的未来通信网络发展的必然趋势。
     本论文所研究的认知网络QoS自主控制技术,主要是指在认知网络环境下实施QoS决策和控制时所采取的具有自主性和智能性的方法,解决动态多变网络适变性差、全网效能低的问题,有效提高网络资源利用率,保证网络端到端的QoS。针对当前网络“多业务、需求差异、动态时变、资源稀缺”等问题,主要从面向业务的认知网络QoS自主控制框架、认知网络QoS健康度评估、认知网络QoS劣化定位和认知网络QoS自主控制等角度,借助贝叶斯网络的理论与方法,深入研究认知网络环境下面向业务的QoS自主控制机制,实现复杂多变认知网络环境下的全局性可监测、可分析、可控制,提高网络资源利用率,保证网络端到端QoS。主要研究内容概括如下:
     1.提出了一种面向业务的认知网络QoS自主控制框架。以认知网络业务端到端QoS需求为出发点,结合认知网络QoS自主控制设计目标,在分析现有典型QoS控制框架优点与不足的基础之上,结合OODA的认知过程,提出了一种面向业务的认知网络QoS自主控制框架。
     2.提出了一种基于模糊动态贝叶斯网络的认知网络QoS健康度评估方法。从认知网络QoS健康度评估宏观角度出发,考虑到网络中尽可能多的网元、业务及链路,重新定义了时延、抖动、丢包率三个QoS参数,并建立了认知网络QoS健康度评估的动态贝叶斯网络模型。利用模糊分类方法,将连续变量模糊分类为DBN能够应用的证据信息进行学习和推理,应用直接推理算法进行推理,从而得到连续时间片上的认知网络QoS健康度概率及其发展趋势,为网络决策和控制提供了具有参考价值的评估结果。
     3.提出了一种基于贝叶斯网络的认知网络QoS劣化定位方法。考虑到端到端的探测方法存在探测代价高和无法精确定位的局限性,建立一种基于贝叶斯网络的认知网络QoS劣化定位模型,利用LM1丢包率模型通过少量的端到端探测获取路径状态信息,按照贝叶斯估计方法进行链路劣化的先验概率学习。然后根据获得的证据节点状态信息,将无关劣化的部分路径及其该路径覆盖的链路从模型中删除来降低模型复杂度,然后采用局部联合树算法推理,最终实现对QoS劣化链路的精确定位,为业务等级的QoS自主控制提供准确依据。
     4.提出了一种基于影响图的认知网络QoS自主控制方法。结合传统网络和认知网络领域的相关知识,构建了面向业务的认知网络QoS自主控制的影响图模型,利用贝叶斯网络的簇树推理算法和结点实例化的最优决策方法实现认知网络的自学习和推理,并通过影响图,执行使得效用方程最大化的动作,实现认知网络QoS的自主决策与控制。
The Internet has developed into a huge and complex system with the characteristics ofnonlinear and dynamic. Meanwhile, QoS management and control in the traditional networkis undergoing many challengeswith the new network access technologies and continuousenrichment of network bearing service. Due to the lack of autonomy and intelligence, thenetwork does not have a comprehensive knowledge of its own conditions and behaviors.And the increasingly complex network contributes to the results that the traditional QoSguarantee method of isolated and static performs inefficient and makes decisions passively.Then the network is often congested and its QoS performance becomes deteriorated. Whenservice transmission and QoS guarantee cannot be dynamically adjusted according tochanges in the environment, both network resource utilization and User Satisfaction Degreewill be degraded. Cognitive network is proposed as an active network with the characteristicof cognitive with the inspiration of the technology of cognitive radio. A cognitive network isa network with cognitive process that can perceive current network conditions. It can plan,decide and act on those conditions. It is considered to be the inevitable trend of futurecommunication network with fundamental features of wireless, mobile, broadband andall-IP.
     Autonomous control technology of QoS for cognitive network studied in this thesismainly refers to the autonomous, intelligent and self-adaptive methods during theimplementation of Qos decision and control in the cognitive environment. It can ensureend-to-end QoS of network and promote the resource utility. According to the problemssuch as multi-service, demand differences, dynamic change, resource scarcity in currentnetwork, several issues are taken into consideration in the paper, such as QoS health degreeassessment, QoS degradation location and QoS autonomous control, etc. Bayesian networktheory is used to realize global monitoring, analyzability, control ability in the dynamic andcomplex cognitive network environment.
     1. A service-oriented cognitive network QoS control framework is proposed in thispaper. We first research end-to-end QoS requirements of cognitive network service aimingat cognitive network QoS autonomous control. A service-oriented cognitive network QoScontrol framework is provided combining with OODA process based on the analysis of thegeneral QoS framework.
     2. A QoS health degree assessment method based on Fuzzy Dynamic BayesianNetwork is proposed. From the macroscopic point, with the consideration of differentnetwork elements, services and links of the network, re-define the three QoS parameters-delay, jitter, packet loss rate, and build the dynamic Bayesian network model ofcognitive network QoS health degree assessment. Using fuzzy classification method, thecontinuous variable fuzzy classification DBN evidence can be applied to the learning andreasoning, reasoning by directly reasoning algorithm, getting the cognitive network QoShealthy degree of probability and its development trend in continuous time slices.Theseassessment results provide a reference value for the network decision and control.
     3. A deterioration location method based on Bayesian Network is established forcognitive network, which allows for the high cost in end-to-end probe method andlimitation of imprecise positioning. Path status information is obtained through a smallnumber of end-to-end probing in LM1packet loss rate model. A link degradation prioriprobability learning for link failure is carried out in accordance with the Bayesianestimation method. On this base, part of paths that have nothing to do with degradation andthe relative links these paths cover are deleted from model, which can degrade thecomplexity of the model. A precise positioning of QoS degraded links is achieved throughreasoning of local joint tree algorithm, which achieves accurate foundation for QoSindependent control of traffic level.
     4. An autonomous control method of QoS for cognitive network based on influencediagramis proposed. Combing with related knowledge of traditional network and cognitivenetwork, it analyses and determines the influencing factors of service-oriented autonomouscontrol of QoS for cognitive network, constructs the corresponding influence diagrammodel. Ultimately the autonomous control methodof QoS for cognitive network based on akind of influence diagram can be realized. This method achieves self-learning andself-reasoning with Bayesian network cluster tree reasoning algorithm and optimal decisionmethod of nodes instantiation. It realize independent decision and control of the QoS forcognitive network through influence diagram and maximizing the utility equation.
引文
[1] Wojciech B,Andrzej B,et al.Provision of end-to-end QoS in heterogeneous multi-domain networks[J], Annals of Telecommunications,2008,63:559-577.
    [2]林闯,王元卓,任丰原.新一代网络QoS研究[J],计算机学报,2008,31(9):1525-1535.
    [3] C. Fortuna, M. Mohorcic, Trends in the development of communication networks: Cognitive networks[J], Computer Networks,2009,53(9):1354-1376.
    [4]吴建平,刘莹,吴茜,新一代互联网体系结构理论研究进展[J],中国科学E辑:信息科学,2008,38(10):1540-1564.
    [5] Guy P, Harry P. Special issue: QoS, control, and security in next generation networks[J],Telecommunication Systems,2008,39:169
    [6] Future Internet Design Meeting, FIND2008, http://find.isi.edu,April8-9,2008, Los Angeles, CA.
    [7]林闯,雷蕾,下一代互联网体系结构研究[J],计算机学报,2007,30(5):694-711.
    [8] Clark.D, PartridgeC, Ramming J.C. and Wroclawski, J.T, A knowledge plane for the internet[C],Proceedings of the2003Conference on Applications, Technologies, Architectures, and Protocols forComputer Communications,2003,pp:3-10, Karlsruhe, Germany.
    [9] Tennenhouse, D.L., Smith, J.M., Sincoskie, W.D., et al. A survey of active network research [J], IEEECommunications Magazine,2004,35(1),80-86.
    [10] IBM. Autonomic manifesto (2001)[EB/OL], http://www.research. ibm.com/autonomic/manifesto.
    [11] R. Thomas, D. Friend, L. DaSilva, et al., Cognitive networks. Cognitive Radio, Software DefinedRadio,and Adaptive Wireless Systems [M],2007:17-41.
    [12] R Thomas, D Friend, L Dasilva, Congnitive networks:adaptation and learning to achieveend-to-endperformance objectives[J], IEEE Communications Magazine,2006,44(12):51-57.
    [13] A. M. Wyglinski, Cognitive Radio Communication and Networks [J], CommunicationMagazine,IEEE,2008:30-31.
    [14] S. Schmid, M. Sifalakis and D. Hutchison, Towards Autonomic Networks[C], Proc. of3rdAnnualConference on Autonomic Networking, Autonomic Communication Workshop, Paris, France,2006:6-7.
    [15] M. I. Smirnov, Autonomic Communication and Wireless Cognitive Networks PanelReport[C], Proc.of the1st International Conference on Cognitive Radio Oriented WirelessNetworks andCommunications, Mykonos Island, Greece,2006:293-302.
    [16] HP Laboratories, The HP Vision for the Adaptive Enterprise: Achieving BusinessAgility.http://h71028.www7.hp.com/enterprise/downloads/ae_business_white_paper_final0703.pdf,2003.
    [17] B. Melcher and B. Mitchell, Towards an Autonomic Framework: Self-Configuring Network Servicesand Developing Autonomic Applications[J], Intel Technology Journal,2004,4(8):279-290.
    [18] J. Strassner, N. Agoulmine and E. Lehtihet, FOCALE: A Novel AutonomicComputingArchitecture[C], Proc. of Latin American Autonomic Computing Symposium, CampoGrande,MS, Brazil,2006.
    [19] Q. Mahmoud, Cognitive Networks: Towards Self-Aware Networks[J],John Wiley&Sons,2007:34-35.
    [20] Clark.D, Partridge C, Ramming J.C, A knowledge plane for the internet[C], Proceedings of the2003Conference on Applications, Technologies, Architectures, and Protocols for ComputerCommunications, pp:3-10, Karlsruhe, Germany.
    [21] Boscovic, D,Cognitive networks[R, EB/OL], Motorola Technology Position Paper,http://www.motorola. Com/mot/doc/6/6005MotDoc.pdf. Accessed June1,2006.
    [22] Thomas, R.W., DaSilva, L.A. and MacKenzie, A.B, Cognitive networks[C], Proceedings of the IEEESymposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN), Baltimore, MD,USA.
    [23] Carolina Fortuna, Mihael Mohorcica, Trends in the development of communication networks:Cognitive networks [J], Computer Networks,2009,53(9):1354-1376.
    [24] R Thomas, D Friend, L Dasilva, Congnitive networks: adaptation and learning to achieve end-to-endperformance objectives[J], IEEE Communications Magazine,2006,44(12):51-57.
    [25] P. Balamuralidhar and R. Prasad.,A Context Driven Architecture for Cognitive Radio Nodes[J],Wireless Personal Communications,2008,45(3):423-434.
    [26] C. Fortuna and M. Mohorcic, Trends in the Development of Communication Networks:CognitiveNetworks[J], Computer Networks,2009. In Press, Corrected Proof.
    [27]刘超,王海涛,网络发展的一种新动向-认知网络[J],数据通信,2009,2:1-5.
    [28]雷宜海,认知网络概述[J],电信快报,2010,4:31-43.
    [29]吴建平,吴茜,徐恪,下一代互联网体系结构基础研究及探索[J],计算机学报,2008,31(9):536-1548.
    [30]闫丹凤,杨放春,下一代网络通用业务管理模型研究[J],电子学报,2007,35(010):1828-1832.
    [31]李世勇,杨冬,秦雅娟,张宏科,基于效用最大化的网络跨层映射[J],软件学报,2011,22(8):1855-1871.
    [32]郭艳艳,康桂霞,张宁波,张平,基于认知无线电系统的协作中继分布式功率分配算法[J],电子与信息学报,2010,32(10):2463-2467.
    [33]杨鹏,吴家皋,网络服务体系结构及其形式化模型的研究[J],计算机研究与展,2005,42(7):1115-1122.
    [34] D. R. Avresky, Guest editors' introduction: special section on autonomic network computing[J].IEEETransactions on Computers,2009,58(11):1441-1443.
    [35] I. Ivanov, Utility Computing: Reality and beyond, E-business and telecommunications [J],2009,23:16-29.
    [36] B. Melcher, B. Mitchell, Towards an autonomic framework: self-configuring network services anddeveloping autonomic applications[J], Intel Technology Journal,2004,8(4):279–290.
    [37] J. Strassner, Context-aware, policy-based seamless mobility using the FOCALE autonomicarchitecture [J],IEEE Computer Society,2009:568-573.
    [38] G. Cybenko, V. Berk, I. Souza, et al., Practical autonomic computing[J], Proceedings of30thAnnualInternational Computer Software and Applications Conference. Chicago, USA, IEEE ComputerSociety,2006:6-14.
    [39] D. Clark, R. Braden, J. Wroclawski, et al., New ARCH: future generation internet architecture[J],Storming Media,2004.
    [40] S. Balasubramaniam, D. Botvich, W. Donnelly, et al., Bio-inspired framework forautonomiccommunication systems[J], Intelligence,2009,69:3-19.
    [41] G. Bouabene, C. Jelger, C. Tschudin, et al., The autonomic network architecture (ANA)[J], IEEEJournal on Selected Areas in Communications,2010,28(1):4-14.
    [42] R. Brachman, D. Advanced, A DARPA information processing technology renaissance: developingcognitive systems,2002, Available from: http://www.darpa.mil/ipto/brefings.
    [43] G. Cybenko, V. Berk, I. Souza, et al., Practical autonomic computing[C], Proceedings of30th AnnualInternational Computer Software and Applications Conference, Chicago, USA, IEEE ComputerSociety,2006:6-14.
    [44] N. Agoulmine, S. Balasubramaniam, D. Botvich, et al., Challenges for autonomic networkmanagement[C],1st Conference on Modelling Autonomic Communication. Dublin, Ireland,2006:1-20.
    [45] S. Schmid, M. Sifalakis and D.Hutchison, Towards autonomic networks[J]. Lecture Notes inComputerScience,2006,4195:1-11.
    [46] L. Baresi, A. Ferdinando, A. Manzalini, et al., The CASCADAS framework forautonomiccommunications[J], Autonomic Communication,2009:147-168.
    [47] A. Kousaridas, N. Alonistioti, Self-organizing cognitive network elements for next generationcommunication system[C], Proceedings of Networking and Electronic Commerce ResearchConference RivaDel Garda, Italy,2009:145-156.
    [48] Ing-Chau C, Sheng-Wen H. An adaptive QoS guarantee framework for SMIL multimediapresentations with ATM ABR service[C], Proceedings ofIEEE Global Telecommunications Conference.San Francisco, USA,2002,2:1784-1788.
    [49] Aiber, S., Gilat, D., Landau, A. et al., Autonomic self-optimization according to businessobjectives[C], IEEE1st International Conference on Autonomic Computing, May.2004:206-213.
    [50] Bhat, V., Parashar, M., Liu, H. et al., Enabling self-managing applications using model-based onlinecontrol strategies[C], IEEE International Conference on Autonomic and Autonomous Systems, July.2006:15-24.
    [51] Bahati, R., Bauer, M., Vieira, E. et al., Using policies to drive autonomic management[C], IEEE7thInternational Symposium on a World of Wireless Mobile and Multimedia Networks, June.2006.
    [52] Liu, H. and Parashar, M, Accord: a programming framework for autonomic applications[J], IEEETransactions on Systems, Man and Cybernetics,2006,36(3),341–52.
    [53] Samman, N. and Karmouch, A. An automated policy-based management framework for differentiatedcommunication systems[J], IEEE Journal on Selected Areas in Communications,2005,23(12),2236–47.
    [54] Tian M, Gramm A, Ritter H, et al. Adaptive QoS for mobile web services through cross-layercommunication[J], Computer,2007,40(2):59-63.
    [55] Tsesmetzis D, Roussaki I, QoS-aware web service maximization[J], Simulation Sykas E. Modelingand simulation of selection for provider profit2007,83(1):93-106.
    [56] Tian M, Gramm A, Naumowicz T, et al., A concept for QoS integration in web services[C],Proceedings of4th International Conference on Web Information Systems Engineering Workshops.Roma,Italy,2003:149-155.
    [57] Hsu-Yang K, Yen-Yen L, Chia-Ni L, A configurable multicast multimedia framework supportingadaptive QoS[C], Proceeding of IEEE International Symposium on Communications and InformationTechnology,2004,1:356-361.
    [58] Abdelwahed, S., Kandasamy, N. and Neema, S., A control-based framework for self-managingdistributed computing systems[C], ACM Workshop on Self-Healing Systems, October,2004.
    [59] Suzuki, J. and Suda, T. A middleware platform for a biologically inspired network architecturesupporting autonomous and adaptive applications[J], IEEE Journal on Selected Areas inCommunications,2005,23(12),249-260.
    [60] Daniel H. F, Mustafa Y. E, et al. Architecture and Performance of an Island Genetic Algorithm-basedCognitive Network[C], In Proceedings of Fifth IEEE Consumer Communications&NetworkingConference(CCNC2008).
    [61]辛明军,吴超,李伟华.基于多Agent的复合模型求解自适应QoS机制[J],计算机工程,2007,33(18):72-74.
    [62]沈芙辉,周娅.一种用十无线系统的自适应QoS结构[J],网络安全技术与应用,2006,8:92-94.
    [63] Gelenbe, E. and Liu P, QoS and routing in the cognitive packet network[C], IEEE6th InternationalSymposium on a World of Wireless Mobile and Multimedia Networks, June.2005.
    [64]姚尹雄,土豪行.,MAQF:一种新的移动Ad2Hoc网络自适应QoS结构框架[J],电子学报2002,30(5):727-730.
    [65]刘均,郑庆华,一种基于分层结构的动态自适应QoS分布控制模型[J],通信学报,2002,23(9):100-106.
    [66] Ali Tizghadam, Alberto Leon-Garcia, Autonomic Traffic Engineering for Network Robustness[J],IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS,2010,28(1):39-50
    [67]汤庸,杨学良,基于IP网络的自适应QoS管理方案研究[J],计算机学报,2001,24(1):32-39.
    [68]汤庸,杨学良,Qos映射与自适应i办商机制的研究与实现[J],软件学报,2001,12(5):751-757.
    [69]林闯,王元卓,任丰原.新一代网络QoS研究[J].计算机学报,2008,31(9):1525-1534.
    [70]冯光升,王慧强,马春光,面向认知网络的用户QoS动态自配置方法[J],通信学报,2010,31(3):133-139.
    [71] Erol G and Georgia S. Admission of QoS Aware Users in a Smart Network[J], ACM Transactions onAutonomous and Adaptive Systems,2008.3(1).
    [72]孙雁飞,基于智能控制与决策的网络QoS保证技术研究[D],南京:南京邮电大学,2006.
    [73] Corwin L. Atwooda, Robert W. Youngblood, Mixture Priors for Bayesian PerformanceMonitoring2:variable-Constituent Model[J],Reliabiliy Engineering and System Safety,2005,89:164-176
    [74].刘启元,张聪,沈一栋,信度网络推理方法及问题(上)[J],计算机科学,2001,28(1):74-77.
    [75]刘启元,张聪,沈一栋.信度网络推理方法及问题(下)[J],计算机科学,200128(2):115-118.
    [76] Stephenson T A. An Introduction to Bayesian Network Theory and Usage. IDIAP-PR00-03,Feb,2000.
    [77] Charniak E, Bayesian Networks without Tears[J], AI Magazine,1991,12(4):50-63.
    [78]张连文,郭海鹏,贝叶斯网引论[M],北京:科学出版社,2006.
    [79] Koller D, Pfeffer A, Object-o riented Bay esian netw or ks[C], Proc UAI97. San Francisco: MorganKarfman,1997:302-313.
    [80] BangsO, Wuillemin P H, Object oriented Bayesiannetworks: A framework for top-down specificationoflarge Bayesian networks with repetitive structures [R], Aalborg: Department of Computer Science,2000.
    [81] Langseth H, BangsO, Parameter learning in objectoriented Bayesian networks[J], Annals ofMathematicsand Artificial Intelligence,2001,32(1):221-243.
    [82] Langseth H, Nielsen T D. Fusion of domain knowledgewith data for structural learning in objectorienteddomain[J], Journal of Machine Learning Research,2004,4(3):339-368.
    [83] Bang sO, Object oriented Bayesian networks [D], Aalborg: Aalborg University,2004.
    [84] Gy ftodimos E, Flach P, Hierarchical Bayesiannetworks: An approach to classification and learningforstructured data[C], Proc of the Work-in-Progress Trackat the13th Int Conf on Inductive LogicProgramming.Zagreb: Ruder Boskovic Institute,2003:25-36.
    [85] Gyftodimos E, Flach P A, Learning hierarchicalBayesian networks for human skill modeling [C],Procof the2003UK Workshop on ComputationalIntelligence. Bristol: University of Bristol,2003:55-62.
    [86] Gyftodimos E, Flach P A, Hierarchical Bayesiannetworks: A probabilistic reasoning modelforstructured domains [C], Proc of the ICM L-2002Workshop on Development of Representations.SanFrancisco: University o f New South Wales,2002:23-30.
    [87] Friedman N, Getoor L, Koller D, et a l., Learningprobabilistic relational models[C], Proc of the16thIntJoint Conf on Artificial Intelligence. Stockholm:Morgan Kaufman,1999:1300-1309.
    [88] Getoor L, Learning statistical models from relationaldata[D],Stanford: Stanford University,2002.
    [89] Koller D, Probabilistic relational models[C], InductiveLogic Programming9th Int Workshop. Berlin:Springer Verlag,1999:3-13.
    [90] Dean T, Kanazaw a K, A model for reasoning aboutpersistence and causation [J],ComputationalIntelligence,1989,5(3):142-150.
    [91] Friedman N, Murphy K, Russell S, Learning thestructure of dynamic probabilistic networks [C],TheProc14th Conf on Uncertainty in ArtificialIntelligence. Madison: Morgan Karfmann,1998:139-147.
    [92] Murphy K P, Dynamic Bayesian networks: Representation, inference and learning [D], Berkeley:University of California,2002.
    [93] Ferat Sahin, A Bayesian Network Approach to the Self-organization and Learning in IntelligentAgents [D], Blacksburg: Virginia Polytechnic and State University,2000.
    [94]王双成,贝叶斯网络学习、推理与应用[M],上海:立信会计出版社,2010:101-110.
    [95] H. Schulzrinne, S. Casner, R. Frederick, et al., RTP:A Transport Protocol for Real-Time Applications
    [R], IETF Technical Report RFC3550, July2003.
    [96]李玉峰,邱菡,兰巨龙,汪斌强,路由器缓存需求[J],软件学报,2008,19(3):733-743.
    [97] Crowcroft J, Hand S, Mortier R. QoS’s downfall: At the bottom or not at all[C], In: Proc. of the ACMSIGCOMM Workshops.Karlsruhe: ACM,2003.109115.
    [98]王立军,吴建平,改善BGP路由收敛的时间窗口机制[J],软件学报,2008,19(11):29792989.
    [99]林闯,贾子骁,孟坤,自适应的未来网络体系架构[J],计算机学报,2012,35(6):1077-1091.
    [100] YD/T1703-2007,电信级IP QoS体系架构[S],北京:中国通信标准化协会,2007.
    [101] CCITT. Draft Recommendations I. Geneva, Switzerland,1990.
    [102] IETF Working Group on Differentiated Services. http://www.ietf.org/html.charters/diffservcharter.html.
    [103] Carlson M,Weiss W,Blake S,An architecture for differentiatedservices.IETF Internet RFC2475,December1998.
    [104] S. B. Kodeswaran, O. Ratsimor, A. Joshi, et al.,Utilizing semantic tags for policy based networking
    [C], Proceedings of the IEEE Globecom, Washington D.C., USA,2007:1954-1958.
    [105] N. G. Duffield,M, Grossglauser, Trajectory sampling for direct traffic observation networking[J],IEEE/ACM Transactions on Networking,2001,9(3):280-292.
    [106]周翔,基于分类业务的QoS控制技术的研究与实现[D],南京:南京邮电大学,2011.
    [107]罗枫,宋梅,任志军,移动网管中多指标综合评估研究[J],北京邮电大学学报,2004,27(4):97-101.
    [108] Xi Zhenyuan, Chen He, Wang Xiangzhong, et al., Evaluation model for computer networkinformation security based on analytic hierarchy process [C], IITA2009, Nanchang,2009:186-189.
    [109]罗赟骞,夏靖波,陈天平.基于云模型和熵权的网络性能综合评估模型[J],重庆邮电大学学报:自然科学版,2009,21(6):771-775.
    [110]张靖,模糊综合评判的校园网性能评价研究[J],电子科技大学学报,2009:38(6):998-1000.
    [111] Pearl J, Probabilistic reasoning in intelligent systems: networks of plausible inference [M], SanMateo, California, Morgan Kaufman Publishers,1988.
    [112] Hyvarinen A., Fast and robust fixed-point algorithms for independent component analysis [J], IEEETrans. on Neural Networks.1999,10:26-34.
    [113] Bell A. J., Sejnowski T. J., The Independent Components of natural scenesare edge filters [J], VisionResearch,1997,37:3327-3338.
    [114] Girolami M., Negentropy and kurtosis as projection persuit indices provide generalized ICAalgorithms [C], In Advances in Neural Inofrmation Processing Systems-1996Blind Signal SeparationSorkshop,1996, vol.9.
    [115]温祥西,孟相如,基于支持向量机和云模型的网络健康状态评估[J],北京邮电大学学报,2012,35(1):10-14.
    [116]黄鹂声,周明天,汪文勇,大型网络健康度的快速评估方法[J],电子科技大学学报,2007,36(6):1374-1377.
    [117]童晓薇,一种基于网络的业务系统健康度评估方法[J],重庆理工大学学报(自然科学),2012,26(8):101-106.
    [118]郭苑,基于业务的认知网络健康度评价体系研究[D],南京:南京邮电大学,2011.
    [119]龚正虎,卓莹,网络态势感知研究[J],软件学报,2010,21(7):16051619.
    [120] Wang J, Zhang FL, Fu C, Chen LS, Study on index system in network situation awareness[J],Computer Applications,2007,27(8):19071909.
    [121] Jiang Y, Lin C, Wu JP. Integrated performance evaluation criteria for network traffic control [J],Chinese Journal of Computers,2002,25(8):869877.
    [122] Chen XZ, Zheng QH, Guan XH, Lin CG, Quantitative hierarchical threat evaluation model fornetwork security [J], Journal of Software,2006,17(4):885-897.
    [123] Zhao KQ, Set Pair Analysis and Applications, Hangzhou: Science and Technology Press,2000.
    [124] Das S, Lawless D, Ng B, Pfeffer A, Factored particle filtering for data fusion and situationassessment in urban environments[C], In: Proc. of the FUSION.2005.955-962.
    [125] Zhang Y, Ji Q, Loonet C, Active information fusion for decision making under uncertainty[C], In:Proc. of the ISIF.2002.643-650.
    [126] Mirmoeini F, Krishnamurthy V, Reconfigurable Bayesian networks for hierarchical multi-stagesituation assessment in battle space[C], In: Proc. of the39th Asilomar Conf. on Signals, Systems andComputers.2005.104-108.
    [127] Shafer G, A Mathematical Theory of Evidence [D], Princeton: Princeton University Press,1976.
    [128] Xu XH, Liu ZL,A method for situation assessment based on D-S evidence theory [J], ElectronicsOptics&Control,2005,12(5):36-37.
    [129] Wei SZ, Zhao H, Wang G, Zhang XD. Situation assessment model of complex system and itsimplementation method based on ontology[J]. Journal of System Simulation,2005,17(5):12001202.
    [130] Li WS, Wang BS, A synthetic method for situation assessment based on fuzzy logic and D-Sevidential theory [J], Systems Engineering and Electronics,2003,25(10):12781280.
    [131] Ticha B, Ranchin T, A case based reasoning data fusion scheme: Application to offshore windenergy resource mapping[C], In: Proc.of the Int’l Conf. on Information Fusion (FUSION).2006.1-5.
    [132] Deng JL, Gray Control System [M], Wuhan: Publishing House of Center-China University ofTechnology,1985.
    [133] Pawlak Z, Rough Sets: Theoretical Aspects of Reasoning about Data. Boston: Kluwer AcademicPublishers,1991.1-10.
    [134] Wei SZ, Jin ND, Hui XJ, Liu H, Zhang XD, A situation assessment model and its application basedon data mining[C], In: Proc. of the FUSION.2006.1-7.
    [135] Zhuo Y, Zhang Q, Gong ZH, Network situation assessment based on RST[C], In: Proc. of thePACIIC. Wuhan,2008.502-506.
    [136] Lakhina A, Crovella M, Diot C, Mining anomalies using traffic feature distributions[C], In: Proc. ofthe ACM SIGCOMM.2005.217228.
    [137] Wang H, Gong ZH, Algorithm based on entropy for finding critical traffic matrices[J], Journal ofSoftware,2009,20(5):13771383.
    [138] Kosala R, Blocked H, Web mining research: A survey[J], ACM SIGKDD Explorations,2000,2(1):115.
    [139] Dhillon I, Guan Y, Kogan J, Iterative clustering of high dimensional text data augmented by localsearch[C], In: Proc. of the2002IEEE Int’l Conf. on Data Mining.2002.131138.
    [140] Zhuo Y, Zhang Q, Gong ZH, Research and implementation of network transmission situationawareness[C], In: Proc. of the CSIE. Los Angeles,2009.210214.
    [141] Sun JG, Liu J, Zhao LY, Clustering algorithms research[J], Journal of Software,2008,19(1):4861.
    [142] Friedman N., Murphy K., Russell S., Learning the structure of dynamic probabilistic networks [C],14th Conf. on Uncertainty in Artificial Intelligence,1998.
    [143] Bai C. G., Hu Q. P., Xie M., et al., Software failure prediction based on a Markov Bayesian networkmodel [J], The Journal of Systems and Software,2005,74:275-282.
    [144]白成刚,俞蒙槐,胡上序,基于多重马尔可夫Bayes网的软件失效预测模型[J],计算机工程与应用,2003,10:40-42.
    [145] Bilmes, J., Dynamic Bayesian multinets [C], In: Proceedings of the16th Conference on Uncertaintyin Artificial Intelligence, Stanford University, CA,2000,38-45.
    [146] Konishi, S., Ando, T., Imoto, S, Bayesian information criteria and smoothing parameter selection inradial basis function networks [J], Biometrical,2004,91(1):27-43.
    [147] Gordon N., Salmond D. and Smith A.F M., Novel Approach to Nonlinear and Non-GaussianBayesian State Estimation[C], IEE Proceedings-F,1993, Vo1.140,107-113.
    [148] Sunyong Kim, Seiya Imoto, Satoru Miyano, Dynamic Bayesian network and nonparametricregression for nonlinear modeling of gene networks from time series gene expression data [J], BioSystems2004,75(1-3):57-65.
    [149] Kim CJ, Piger J. Common stochastic trends, common cycles, and asymmetry in economic actuations,working paper, n.681, International Finance Division, Federal Reserve Board, September2000.
    [150]姚宏亮,动态多智能体建模与决策问题研究[D],合肥:合肥工业大学,2007.
    [151] Santos E., Joel D. Young., Probabilistic temporal networks: A unified framework for reasoning withtime and uncertainty [J], Intl. J. of Approximate Reasoning,1999,20(3):191-216.
    [152]肖秦琨,高嵩,高晓光,动态贝叶斯网络推理学习理论及其应用[M],北京:国防工业出版社,2007.10.
    [153] Z. Ghahranani, Learning dynamic Bayesian networks [C], In C. L. Giles and M. Gori, editors,Adaptive processing of temporal information, Lecture notes in artificial intelligence. Springer-Verlag,1997,11(4):1725-1728.
    [154] Z. Ghahranani, M. I. Jordan, Factorial hidden markov models [J], Machine Learning,1997,54(29):245-273.
    [155] M. Brand and N. Oliver, Coupled hidden Markov models for complex action recognition [J],Machine Learning,1997,32(2):345-378.
    [156] Lauritzen S L, The EM algorithm for graphical association models with missing data [J],Computational Statistics and Data Analysis,1995,19(2):191-201.
    [157] Spieglhater D. J., Lauritzen S L., Sequential Updating of Conditional Probabilities on DirectedGraphical Structures [J], Networks,1990,20(5):579-605.
    [158]胡玉胜,动态贝叶斯网络研究及其应用[D],北京:北京科技大学,2001.
    [159]史志富,张安,贝叶斯网络理论及其在军事系统中的应用[M],.北京:国防工业出版社,2012.
    [160]史建国,高晓光,李相民,离散模糊动态贝叶斯网络用于无人作战飞机目标识别[J],西北工业大学学报,2006,24(1):45-49.
    [161]邱若海,高晓光,模糊离散动态贝叶斯网络的目标威胁等级评估[J],火力与指挥控制,2012,37(4):14-17.
    [162]候定王,王战军,非线性评估的理论探索与应用[M],合肥:中国科学技术大学出版社,2001.
    [163] R. Caceres, N. G Duffield, J. Horowitz, and D.Towsley. Multicast-based infer of network internalloss characteristics [J], IEEE Trans.Inf.Theory,1999,45(7):2462-2480.
    [164] V. N. Padmanabhan, L. Qiu, Server-based inference of Internet performance[C], in Proceedings ofthe IEEE INFOCOM'03,San Franciso,CA,2003:3301-3309.
    [165] N. G. Duffield, Network tomography of binary network performance characteristics[J], IEEETransactions on Information Theory,2006,52(12):5373-4388.
    [166] H. X. Nguyen, Patrick Thrian, Using End-to-End Data to Infer Lossy Links in Sensor Networks[C],IEEE INFOCOM2006Proceedings of the25th IEEE International Conference on ComputerComunications,2006:1-2.
    [167] A. Batsakis, T. Malik, and A. Terzis, Practical passive lossy link inference[C], IN Proc, of PAM2005, vo1.3431:362-367.
    [168] Hung X. Nguyen, Patrick Thiran. The Boolean Solution to the Congested IP Link Location Problem:Theory and Practice[C], IEEE International Conference on ComputerCommunications.2007:2117-2125.
    [169] D. Ghita, K. Argyraki, P. Thiran, Network Tomography on Correlated Links[C], Proceedings of the10th annual conference on Internet measurement ACM New York, NY, USA2010.
    [170] H. X. Nguyen, Patrick Thrian. Network Loss Inference with Second Order Statistics of End-to-EndFlows[C], Proceeding IMC'07Proceedings of the7th ACM SIGCOMM conference on Internetmeasurement ACM New York, NY, USA2007.
    [171] D. Ghita, H. X. Nguyen et al., Netscope: Practical Network Loss Tomography [C], IEEE INFOCOM,San Diego, CA, USA, March14-19,2010:1-9.
    [172]李志青,动态系统近似故障定位算法及实现[D],北京邮电大学,2010.
    [173]董海疆,基于贝叶斯网的IP网络故障定位算法的研究和实现[D],北京邮电大学,2009.
    [174]宁宗,基于网络层析成像的多时隙故障链路诊断[D],电子科技大学,2011.
    [175] NGUYEN H X, THIRAN P, Network loss inference with second order statistics of end-to-end flows[C], IMC'07: Proceedings of2007ACM Internet Measurement Conference, New York: ACM.
    [176] Y. Shavitt, X. Sun, A. Wool, and B. Yener, Computing the unmeasured:An algebraic approach tointernet mapping[J], IEEE J. on Selected Areas in Communications, vol.22, January2004.
    [177]杜艳明,韩冰,肖建华,基于贝叶斯模型的IP网拥塞链路诊断算法[J],计算机应用,2012,32(2):347-351.
    [178] Y. Zhang, N. Duffield, V. Paxson, and S. Shenker, On the constancy of internet path properties[C], inProceedings of ACM SIGCOMM Internet Measurement Workshop, San Francisco,2001.
    [179] Y. Vardi, Network tomography: Estimating source-destination traffic intensities[J], Journal of theAmerican Statistical Association,1996,91:365–377.
    [180]刘俊娜,贝叶斯网络推理算法研究[D],合肥:合肥工业大学,2007.
    [181] Hung X. Nguyen, Patrick Thiran. The Boolean Solution to the Congested IP Link Location Problem:Theory and Practice[C], IEEE International Conference onComputerCommunications.2007:2117-2125.
    [182] ODINTSOVA N, RISH I, Empirical study of topology effects on diagnosis in computer networks[C], MASS'07: Proceedings of2007IEEE International Conference on Mobile Ad Hoc and SensorSystems, Washington, DC: IEEE Computer Society,2007:1-6.
    [183] A. Medina, I. Matta, and J. Byers, On the origin of power-laws in internet topologies[J],,ACMComputer Communication Review, pp.160-163,2000.
    [184] L. L. Peterson, B. S. Davie, A System Approach (2nd edition)[M], Morgan Kaufmann Publisher, Inc,2000:454-457.
    [185]林闯,单志广,任丰原.计算机网络的服务质量(QoS)[M],北京:清华大学出版社,2004:124-153.
    [186] R. A. Howard, J. E, Metheson. Influence diagrams [J], Decision Analysis,2005,2(3):127-143.
    [187] Lauritzen S L, Spiegelhalter D J, Local computations with probabilities on graphical structures andtheir applications to expert systems [J], Proceedings of the Royal Statistical Society,1988,50(2):157-224.
    [188] Ferat Sahin,A Bayesian Network Approach to the Self-organization and Learning in IntelligentAgents [D], Blacksburg: Virginia Polytechnic and State University,2000.
    [189]黄桂松,基于智能理论的认知网络QoS方法研究[D],南京:南京邮电大学,2011.
    [190] Netica Bayesian Network software from Norsys. Netica Tutorial [DB/OL]. http://www.norsys.com/,2010-3-7.
    [191] Network Simulator Version2nd, The Ns Mannul [DB/OL]. http://www.isi.edu/nsnam/ns/,2010-4-20.
    [192] Chih-Heng Ke, Ce-Kuen Shieh, Wen-Shyang Hwang, et al., An Evaluation Framework for MoreRealistic Simulations of MPEG Video Transmission [J], Journal of Information Science andEngineering,2008,24(2):425-440.
    [193]王慧琴,数字图像处理[M],北京:北京邮电大学出版社,2006:46-47.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700