Tsinghua Science and Technology

Issue 1 • Feb. 2018

Filter Results

Displaying Results 1 - 13 of 13
  • Front cover

    Publication Year: 2018, Page(s): c1
    IEEE is not the copyright holder of this material | |PDF file iconPDF (1102 KB)
    Freely Available from IEEE
  • Contents

    Publication Year: 2018, Page(s): 1
    IEEE is not the copyright holder of this material | |PDF file iconPDF (32 KB)
    Freely Available from IEEE
  • SPECIAL SECTION ON CYBERSPACE 
  • RISP: An RPKI-based inter-AS source protection mechanism

    Publication Year: 2018, Page(s):1 - 12
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (1435 KB)

    IP source address spoofing is regarded as one of the most prevalent components when launching an anonymous invasion, especially a Distributed Denial-of-Service (DDoS) attack. Although Source Address Validations (SAVs) at the access network level are standardized by the Internet Engineering Task Force (IETF), SAV at the inter-Autonomous System (AS) level still remains an important issue. To prevent... View full abstract»

    Open Access
  • Secure DHCPv6 mechanism for DHCPv6 security and privacy protection

    Publication Year: 2018, Page(s):13 - 21
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (1394 KB)

    With the rapid developmen of the Internet, the exhaustion of IPv4 address limited the development of the Internet for years. IPv6, as the core technology of the next generation Internet, has since been rapidly deployed around the world. As the widely deployed address configuration protocol, DHCPv6 is responsible for allocating globally unique IPv6 addresses to clients, which is the basis for all t... View full abstract»

    Open Access
  • Measuring BGP AS path looping (BAPL) and private AS number leaking (PANL)

    Publication Year: 2018, Page(s):22 - 34
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (888 KB)

    As a path vector protocol, Border Gateway Protocol (BGP) messages contain an entire Autonomous System (AS) path to each destination for breaking arbitrary long AS path loops. However, after observing the global routing data from RouteViews, we find that BGP AS Path Looping (BAPL) behavior does occur and in fact can lead to multi-AS forwarding loops in both IPv4 and IPv6. The number and ratio of BA... View full abstract»

    Open Access
  • REGULAR ARTICLES 
  • Hierarchical community detection based on partial matrix convergence using random walks

    Publication Year: 2018, Page(s):35 - 46
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (1896 KB)

    Random walks are a standard tool for modeling the spreading process in social and biological systems. But in the face of large-scale networks, to achieve convergence, iterative calculation of the transition matrix in random walk methods consumes a lot of time. In this paper, we propose a three-stage hierarchical community detection algorithm based on Partial Matrix Approximation Convergence (PMAC)... View full abstract»

    Open Access
  • Apparel brand overlap based on customer perceived value and eye-tracking technology

    Publication Year: 2018, Page(s):47 - 64
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (10194 KB)

    Competition in the apparel market has developed from preliminary price competition, quality competition, and scale competition to the current state of brand competition. The phenomenon of brand overlap cannot be avoided by apparel enterprises during the process of building and manufacturing their brands. This paper has selected nine identification elements of three dimensions, which we used to con... View full abstract»

    Open Access
  • Transmit power optimization for relay-aided multi-carrier D2D communication

    Publication Year: 2018, Page(s):65 - 74
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (1115 KB)

    In this paper, we consider the power optimization problem in Orthogonal Frequency Division Multiplexing (OFDM)-based relay-enhanced device-to-device (D2D) communication. In a single cell transmission scenario, dualhop communication is assumed in which each D2D user re-uses the spectrum of just one Cellular User (CU). In this work, we formulate a joint optimization scheme under a Decode-and-Forward... View full abstract»

    Open Access
  • A new method of portfolio optimization under cumulative prospect theory

    Publication Year: 2018, Page(s):75 - 86
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (5836 KB)

    In this paper, the portfolio selection problem under Cumulative Prospect Theory (CPT) is investigated and a model of portfolio optimization is presented. This model is solved by coupling scenario generation techniques with a genetic algorithm. Moreover, an Adaptive Real-Coded Genetic Algorithm (ARCGA) is developed to find the optimal solution for the proposed model. Computational results show that... View full abstract»

    Open Access
  • A 12-bit 250-MS/s charge-domain pipelined analog-to-digital converter with feed-forward common-mode charge control

    Publication Year: 2018, Page(s):87 - 94
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (3360 KB)

    A feed-forward Common-Mode (CM) charge control circuit for a high-speed Charge-Domain (CD) pipelined Analog-to-Digital Converter (ADC) is presented herein. This study aims at solving the problem whereby the precision of CD pipelined ADCs is restricted by the variation in input CM charge, which can compensate for CM charge errors caused by a variation in CM charge input in real time. Based on the f... View full abstract»

    Open Access
  • Indoor pedestrian tracking with sparse RSS fingerprints

    Publication Year: 2018, Page(s):95 - 103
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (2161 KB)

    Indoor pedestrian localization is of great importance for diverse mobile applications. Many indoor localization approaches have been proposed; among them, Radio Signal Strength (RSS)-based approaches have the advantage of existing infrastructures and avoid the cost of infrastructure deployment. However, the RSS-based localization approaches suffer from poor localization accuracy when the RSS finge... View full abstract»

    Open Access
  • Influence analysis of emotional behaviors and user relationships based on Twitter data

    Publication Year: 2018, Page(s):104 - 113
    IEEE is not the copyright holder of this material | Click to expandAbstract |PDF file iconPDF (32225 KB)

    One of the main purposes for which people use Twitter is to share emotions with others. Users can easily post a message as a short text when they experience emotions such as pleasure or sadness. Such tweet serves to acquire empathy from followers, and can possibly influence others' emotions. In this study, we analyze the influence of emotional behaviors to user relationships based on Twitter data ... View full abstract»

    Open Access
  • Call for papers: Special issue on cognitive systems and computation

    Publication Year: 2018, Page(s): 1
    IEEE is not the copyright holder of this material | |PDF file iconPDF (52 KB)
    Freely Available from IEEE

Aims & Scope

Tsinghua Science and Technology (Tsinghua Sci Technol) aims to highlight scientific achievements in computer science, electronic engineering, and other IT fields. Contributions all over the world are welcome.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Professor Jiaguang Sun
School of Software
Tsinghua University
Beijing  100084 China
journal@tsinghua.edu.cn
Phone:86-10-62771385