Personal metasearch engine (Unbekannt)
- Neue Suche nach: Yuan, F.-y.
- Neue Suche nach: Yu, H.
- Neue Suche nach: Yuan, F.-y.
- Neue Suche nach: Yu, H.
In:
JOURNAL- CHINA INSTITUTE OF COMMUNICATIONS
;
26
, 1a
;
167-170
;
2005
-
ISSN:
- Aufsatz (Zeitschrift) / Print
-
Titel:Personal metasearch engine
-
Beteiligte:Yuan, F.-y. ( Autor:in ) / Yu, H. ( Autor:in )
-
Erschienen in:JOURNAL- CHINA INSTITUTE OF COMMUNICATIONS ; 26, 1a ; 167-170
-
Verlag:
- Neue Suche nach: PEOPLE'S POSTS AND TELECOMMUNICATIONS PUBLISHING
-
Erscheinungsdatum:01.01.2005
-
Format / Umfang:4 pages
-
ISSN:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Print
-
Sprache:Unbekannt
- Neue Suche nach: 384
- Weitere Informationen zu Dewey Decimal Classification
-
Klassifikation:
DDC: 384 -
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis – Band 26, Ausgabe 1a
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Application layer multicast topology construction protocol base on network structureShen, A. / Yang, G.-z. / Lu, S.-f. / Liu, M.-q. / OUYANG-jun et al. | 2005
- 6
-
Rationality-based antnet self-adaptive routingWang, L. / Guo, Q. / Zhang, J. / Lu, Z.-y. et al. | 2005
- 11
-
A traffic collection algorithm for self-Similar trafficWang, Z. / Gao, L. et al. | 2005
- 14
-
Data capture and aggregation system in high-speed network environmentKong, S.-j. / He, T. / Li, X. / Liu, J. et al. | 2005
- 18
-
Research and application of TCP optionsShao, X.-x. / He, T. / Li, X. et al. | 2005
- 22
-
Study on an improved TCP pacing congestion control algorithm based on end-to-end and its simulationWu, G.-w. / Yao, L. et al. | 2005
- 27
-
Multifractal analysis of Internet trafficCheng, H. / Shao, Z.-q. / Fang, Y.-q. et al. | 2005
- 31
-
Analysis and improvement of TCP vegas in a mixed TCP vegas and TCP reno network scenarioHuang, S.-b. / Huang, H.-c. / Wu, Y.-x. et al. | 2005
- 34
-
The quick way for the network abnormal behaviors upon the ratio distribution of the number of TCP packetsChen, L. / Gong, J. / Peng, Y.-b. et al. | 2005
- 41
-
Design & implement of LVS-based proxy clusterYan, H. / Jian, Z. / Jia-sheng, Y. et al. | 2005
- 46
-
Apply petri nets to service process model designRuo-yu, W. / Dan-dan, D. et al. | 2005
- 49
-
Seeking the port of the user with ip assigning independentlyYing-ying, S. / Zhi-huai, L. et al. | 2005
- 52
-
Build netflow statistic program under high performance network circumstanceZhou, C.-l. / Cui, J. / Zhang, B. / Chen, P. et al. | 2005
- 56
-
Technological analysis of checking network cable links with TCPZhu, J.-s. / Xue, R. et al. | 2005
- 59
-
Design and implementation of gigabit IP control gatewayZhang, X.-j. / Cui, J. / Zhang, B. et al. | 2005
- 63
-
Designing and implementing a campus network resources management systemSong, W.-j. / Shang, Q. / Chen, P. et al. | 2005
- 68
-
Research and application of network fault diagnosis frameworkZhu, Y.-c. / Dou, B.-l. / Shang, L.-b. / Yu, X.-y. et al. | 2005
- 72
-
Design and implementation of network management system based on WBMFu, A.-y. / Zeng, Q.-w. / Xu, Z.-h. / Zhang, J.-l. et al. | 2005
- 76
-
A monitoring model for inter-domain routing systemZhu, P.-d. / Liu, X. / Zhao, J.-j. et al. | 2005
- 81
-
Structure the model of network elements in the network management softwareMu, L.-b. / Wu, C.-l. / Cui, J.-q. et al. | 2005
- 86
-
XML-based extensible topology discoveryLu, Z.-y. / Guo, Q. / Wang, L. / Wang, S.-b. et al. | 2005
- 91
-
Characterizing traffic direction through routing aggregationMa, H. / Zhang, X.-j. / Zhang, B. et al. | 2005
- 96
-
Anti-spam manage center design and implementationLuo, X.-e. / Huang, Y.-j. / Ning, G.-n. / Zhang, L. et al. | 2005
- 100
-
A secure multicast encryption algorithm and key management modelCao, G.-l. / Zhou, J. et al. | 2005
- 106
-
The SFlow used in security management of networkChen, B. / Gao, W.-x. / Qu, X.-p. / Liu, H.-r. et al. | 2005
- 109
-
IPv6 address allocation and authentication based on chaos SequenceZheng, H. / Chen, M.-k. / Duan, H.-x. / Li, X. et al. | 2005
- 113
-
IDS evaluation approach based on ROC curvesYao, Y. / Gao, F.-x. / Yu, G. et al. | 2005
- 116
-
A study of buffer overflow detect based on binary codeLiu, F. / Wei, Q. / Wu, H. et al. | 2005
- 121
-
Information hiding in TCP/IP based on chaosZhang, J. / Liu, B. / Zhou, T.-y. / Liu, F.-l. et al. | 2005
- 124
-
Analysis on characters of survivability and emergent algorithmsZhang, Y.-q. / Zhang, H.-z. et al. | 2005
- 129
-
Using running modes for cryptographic protocol analysis: a case studyWang, C.-l. / Tang, Z.-j. / Zhang, Y.-q. / Xue, J.-w. et al. | 2005
- 133
-
The analysis of the change of routing based on the end-to-end measurementSha, K. / Shao, X.-l. / Xia, J.-f. / Hu, J.-b. et al. | 2005
- 136
-
A new wavelet watermarking techniqueYang, S.-y. / Lu, Z.-d. et al. | 2005
- 141
-
Advanced data pre-processing module for Web content filteringZhu, J. / Li, S.-h. / Li, J.-h. et al. | 2005
- 145
-
High speed network packet capture based on NAPILiu, B. / Li, Z.-t. / Li, Y. / Li, Z.-c. et al. | 2005
- 149
-
A SSFNet-based network worm test-bedJing, T. / Zhou, Q.-g. / Wu, W.-z. et al. | 2005
- 153
-
Witty worm propagation and simulation in scale-free networksZhang, Y.-k. / Wang, F.-w. / Zhang, Y.-q. / Ma, J.-f. et al. | 2005
- 158
-
Application and research of bloom filter in firewallZou, Q.-b. / Wu, W. / Li, Z.-t. et al. | 2005
- 163
-
Design and implementation of computing resource management based on the SOGSASong, L. / Hu, L.-s. / Xiao, F. / Xiang, C.-h. et al. | 2005
- 167
-
Personal metasearch engineYuan, F.-y. / Yu, H. et al. | 2005
- 171
-
Improving on rumoring mongering protocol in gnutella networkLi, J.-c. / Zhao, Z.-q. et al. | 2005
- 174
-
The realization of single sign-on in campus information portalRun-qiu, L. / Li-qiu, T. et al. | 2005
- 178
-
Using RBAC model in access control of campus information portalTan, L.-q. / Huang, Y.-b. / Fei, Y.-p. et al. | 2005
- 182
-
An implementation of CA system in JavaZhou, M. / Zhang, B. / Li, X.-n. et al. | 2005
- 185
-
The realization and application of data mining system based on campus networkMeng, H.-d. / Song, Y.-c. / Huang, T.-z. et al. | 2005
- 189
-
The realization of campus network Web information management platformTan, L.-q. / Fei, Y.-p. / Huang, Y.-b. et al. | 2005
- 193
-
Construct strategy and implementation of E-card system in digital campusXi, J. / Lu, Z.-x. / Zhu, X.-h. et al. | 2005
- 197
-
Distributing keys for secure communication in ad hoc networks: a probabilistic approachWu, W. / Zou, Q.-b. et al. | 2005
- 202
-
The application of GSM technology in remote meter-reading system of heat-supply networkLu, L.-l. / Zhao, Y.-s. / Hou, Z. / Zhu, J. / Zhang, W.-j. / Chu, Y.-l. et al. | 2005
- 205
-
An efficient VLR database failure recovery schemeYu, D.-j. / Liu, C.-x. / Zhu, K.-y. et al. | 2005
- 209
-
Study of channel estimation in OFDM-based broadband wireless access systemXing, Y.-h. / Fan, X.-n. et al. | 2005
- 213
-
Evaluation technology based on norros formula for self-similar video trafficLi, Y. / Li, Z.-t. / Liu, B. et al. | 2005
- 217
-
Analyses and research on multicast video tool-VICChen, Y. / Zhang, X. / Li, C.-r. / Li, X. et al. | 2005
- 221
-
Bandwidth constraint model for MPLS diffserv-aware TEXu, X.-x. et al. | 2005
- 226
-
Interpolation algorithm's implement on video terminalXu, H.-y. / Wang, F. et al. | 2005
- 230
-
Deblocking filter algorithm optimization in H26LLiu, D.-j. / Deng, Z.-l. / Cui, Y.-s. et al. | 2005
- 234
-
Performance analysis based on TCP in hierarchical MIPv6 with fast handoverHe, J. / Zhou, J. et al. | 2005
- 238
-
IPv6 network simulation environment based on SNMP agentRen, X.-t. / Zhao, X.-y. / Ma, Y. et al. | 2005
- 242
-
IPv6-based information appliance applicationChen, P. / Cui, J. / Song, W.-j. / Zhou, C.-l. / Zhang, B. et al. | 2005
- 247
-
Campus networks access in IPv6 backbone environmentZhou, Y. / Gong, J. et al. | 2005
- 251
-
Design and implementation of IPv6-based network chatting systemQiu, Q.-j. / Wang, K. / Zeng, J. / Li, Z.-g. et al. | 2005
- 255
-
A design of simplified IPv6 stack based on embedded systemLi, X. / Li, Y.-z. / Yu, G.-h. et al. | 2005
- 259
-
Distributed computational resource managementJi, L. / Yang, Y.-x. / Wang, S.-h. et al. | 2005
- 264
-
Design and implementation of file dispatcher in distributed resource manage systemWang, P. / Ai, F. / Wu, Y.-p. et al. | 2005
- 267
-
Web services oriented application integrationRen, X.-x. / Zhang, B. / Li, X.-n. et al. | 2005
- 271
-
Design and implementation of CERNET payment platformBian, X.-w. / Hu, S. / Wang, S. / Liu, X.-b. / Wang, X.-q. et al. | 2005
- 275
-
The preprocessing technique of E-commerce data miningGuo, W.-g. et al. | 2005
- 279
-
Application of code generation in E-business development platformZhang, G.-z. / Wu, Q.-y. et al. | 2005
- 284
-
Design and implementation of a web-based feature extraction search engineChun-yan, Q. / Tie-li, S. et al. | 2005
- 289
-
Research and implemention of parallel particle swarm optimization algorithmZhang, L. / Yang, B. et al. | 2005
- 293
-
A topology-aware peer-to-peer network based on small-world modelJiang, J.-j. / Wang, W.-n. et al. | 2005