A Control Task Assignment Algorithm based on sub-graph isomorphism

被引:0
|
作者
Yu, Feng [1 ,2 ,3 ]
Li, Xixian [1 ,3 ]
Zhang, Huimin [1 ,4 ]
Wang, Li-e [1 ,3 ]
机构
[1] Guangxi Normal Univ, Coll Comp Sci, Guilin, Peoples R China
[2] Southeast Univ, Key Lab Comp Network & Informat Integrat, Nanjing, Peoples R China
[3] Guangxi Key Lab Multisource Informat Min &Secur, Guilin, Peoples R China
[4] Guilin Univ Elect Technol, Guangxi Key Lab Trusted Software, Guilin, Peoples R China
关键词
trustworthy and controllable network; control task assign; subgraph isomorphism;
D O I
10.1109/CBD51900.2020.00055
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To enhance the controllability and trustworthiness of the Internet, a new network control architecture has been presented with control task extracted to the intra-domain control node and executed in distributed multi-domain cooperative style. The study on control task assigning approach plays a central role in this network control pattern and shares some features with virtual network mapping problem. Different from the previous heuristics-based algorithms, we designs a baseline assigning algorithm which tests if the control task request can be mapped to a sub-graph of substrate control network or not without control task migration. Subsequently, an extend version is described under task migration considered. Our experiment evaluations show the impact of parameters on the runtime and assigning accuracy rate.
引用
收藏
页码:265 / 271
页数:7
相关论文
共 50 条
  • [1] An algorithm portfolio for the sub-graph isomorphism problem
    Battiti, Roberto
    Mascia, Franco
    [J]. ENGINEERING STOCHASTIC LOCAL SEARCH ALGORITHMS: DESIGNING, IMPLEMENTING AND ANALYZING EFFECTIVE HEURISTICS, 2007, 4638 : 106 - +
  • [2] A Quantum Algorithm for the Sub-graph Isomorphism Problem
    Mariella, Nicola
    Simonetto, Andrea
    [J]. ACM TRANSACTIONS ON QUANTUM COMPUTING, 2023, 4 (02):
  • [3] Virtual network embedding algorithm based on improved sub-graph isomorphism search
    Wei, Xiao-Hui
    Zou, Lei
    Li, Hong-Liang
    [J]. Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2013, 43 (01): : 165 - 171
  • [4] A Privacy Policy Conflict Detection Method based on Sub-graph Isomorphism
    Ren, Yi
    Peng, Zhiyong
    Cheng, Fangquan
    Guo, Sipei
    [J]. MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 107 - +
  • [5] Identification of application specific instructions based on sub-graph isomorphism constraints
    Wolinski, Christophe
    Kuchcinski, Krzysztof
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES, AND PROCESSORS, 2007, : 328 - +
  • [6] Product Recognition in Store Shelves as a Sub-Graph Isomorphism Problem
    Tonioni, Alessio
    Di Stefano, Luigi
    [J]. IMAGE ANALYSIS AND PROCESSING,(ICIAP 2017), PT I, 2017, 10484 : 682 - 693
  • [7] An algorithm for weighted sub-graph matching based on gradient flows
    Tao, Songqiao
    Wang, Shuting
    [J]. INFORMATION SCIENCES, 2016, 340 : 104 - 121
  • [8] Sub-graph degree-based bridge centrality algorithm
    Ezeh, Chinenye
    Tao, Ren
    Xu, Yan-Jie
    Sun, Shi-Xiang
    Zhe, Li
    [J]. INTERNATIONAL JOURNAL OF MODERN PHYSICS C, 2021, 32 (07):
  • [9] ODES: an overlapping dense sub-graph algorithm
    Long, James
    Hartman, Chris
    [J]. BIOINFORMATICS, 2010, 26 (21) : 2788 - 2789
  • [10] Research on transitivity in dynamic networks based on sub-graph sampling algorithm
    Lin, Nan
    Wei, Tao
    Xia, Kaijian
    Cai, Jian
    Fan, Hongchun
    [J]. Journal of Computational Information Systems, 2015, 11 (08): : 3019 - 3030