Personal metasearch engine (Unknown)
- New search for: Yuan, F.-y.
- New search for: Yu, H.
- New search for: Yuan, F.-y.
- New search for: Yu, H.
In:
JOURNAL- CHINA INSTITUTE OF COMMUNICATIONS
;
26
, 1a
;
167-170
;
2005
-
ISSN:
- Article (Journal) / Print
-
Title:Personal metasearch engine
-
Contributors:Yuan, F.-y. ( author ) / Yu, H. ( author )
-
Published in:JOURNAL- CHINA INSTITUTE OF COMMUNICATIONS ; 26, 1a ; 167-170
-
Publisher:
- New search for: PEOPLE'S POSTS AND TELECOMMUNICATIONS PUBLISHING
-
Publication date:2005-01-01
-
Size:4 pages
-
ISSN:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:Unknown
- New search for: 384
- Further information on Dewey Decimal Classification
-
Classification:
DDC: 384 -
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents – Volume 26, Issue 1a
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Application layer multicast topology construction protocol base on network structureShen, A. / Yang, G.-z. / Lu, S.-f. / Liu, M.-q. / OUYANG-jun et al. | 2005
- 6
-
Rationality-based antnet self-adaptive routingWang, L. / Guo, Q. / Zhang, J. / Lu, Z.-y. et al. | 2005
- 11
-
A traffic collection algorithm for self-Similar trafficWang, Z. / Gao, L. et al. | 2005
- 14
-
Data capture and aggregation system in high-speed network environmentKong, S.-j. / He, T. / Li, X. / Liu, J. et al. | 2005
- 18
-
Research and application of TCP optionsShao, X.-x. / He, T. / Li, X. et al. | 2005
- 22
-
Study on an improved TCP pacing congestion control algorithm based on end-to-end and its simulationWu, G.-w. / Yao, L. et al. | 2005
- 27
-
Multifractal analysis of Internet trafficCheng, H. / Shao, Z.-q. / Fang, Y.-q. et al. | 2005
- 31
-
Analysis and improvement of TCP vegas in a mixed TCP vegas and TCP reno network scenarioHuang, S.-b. / Huang, H.-c. / Wu, Y.-x. et al. | 2005
- 34
-
The quick way for the network abnormal behaviors upon the ratio distribution of the number of TCP packetsChen, L. / Gong, J. / Peng, Y.-b. et al. | 2005
- 41
-
Design & implement of LVS-based proxy clusterYan, H. / Jian, Z. / Jia-sheng, Y. et al. | 2005
- 46
-
Apply petri nets to service process model designRuo-yu, W. / Dan-dan, D. et al. | 2005
- 49
-
Seeking the port of the user with ip assigning independentlyYing-ying, S. / Zhi-huai, L. et al. | 2005
- 52
-
Build netflow statistic program under high performance network circumstanceZhou, C.-l. / Cui, J. / Zhang, B. / Chen, P. et al. | 2005
- 56
-
Technological analysis of checking network cable links with TCPZhu, J.-s. / Xue, R. et al. | 2005
- 59
-
Design and implementation of gigabit IP control gatewayZhang, X.-j. / Cui, J. / Zhang, B. et al. | 2005
- 63
-
Designing and implementing a campus network resources management systemSong, W.-j. / Shang, Q. / Chen, P. et al. | 2005
- 68
-
Research and application of network fault diagnosis frameworkZhu, Y.-c. / Dou, B.-l. / Shang, L.-b. / Yu, X.-y. et al. | 2005
- 72
-
Design and implementation of network management system based on WBMFu, A.-y. / Zeng, Q.-w. / Xu, Z.-h. / Zhang, J.-l. et al. | 2005
- 76
-
A monitoring model for inter-domain routing systemZhu, P.-d. / Liu, X. / Zhao, J.-j. et al. | 2005
- 81
-
Structure the model of network elements in the network management softwareMu, L.-b. / Wu, C.-l. / Cui, J.-q. et al. | 2005
- 86
-
XML-based extensible topology discoveryLu, Z.-y. / Guo, Q. / Wang, L. / Wang, S.-b. et al. | 2005
- 91
-
Characterizing traffic direction through routing aggregationMa, H. / Zhang, X.-j. / Zhang, B. et al. | 2005
- 96
-
Anti-spam manage center design and implementationLuo, X.-e. / Huang, Y.-j. / Ning, G.-n. / Zhang, L. et al. | 2005
- 100
-
A secure multicast encryption algorithm and key management modelCao, G.-l. / Zhou, J. et al. | 2005
- 106
-
The SFlow used in security management of networkChen, B. / Gao, W.-x. / Qu, X.-p. / Liu, H.-r. et al. | 2005
- 109
-
IPv6 address allocation and authentication based on chaos SequenceZheng, H. / Chen, M.-k. / Duan, H.-x. / Li, X. et al. | 2005
- 113
-
IDS evaluation approach based on ROC curvesYao, Y. / Gao, F.-x. / Yu, G. et al. | 2005
- 116
-
A study of buffer overflow detect based on binary codeLiu, F. / Wei, Q. / Wu, H. et al. | 2005
- 121
-
Information hiding in TCP/IP based on chaosZhang, J. / Liu, B. / Zhou, T.-y. / Liu, F.-l. et al. | 2005
- 124
-
Analysis on characters of survivability and emergent algorithmsZhang, Y.-q. / Zhang, H.-z. et al. | 2005
- 129
-
Using running modes for cryptographic protocol analysis: a case studyWang, C.-l. / Tang, Z.-j. / Zhang, Y.-q. / Xue, J.-w. et al. | 2005
- 133
-
The analysis of the change of routing based on the end-to-end measurementSha, K. / Shao, X.-l. / Xia, J.-f. / Hu, J.-b. et al. | 2005
- 136
-
A new wavelet watermarking techniqueYang, S.-y. / Lu, Z.-d. et al. | 2005
- 141
-
Advanced data pre-processing module for Web content filteringZhu, J. / Li, S.-h. / Li, J.-h. et al. | 2005
- 145
-
High speed network packet capture based on NAPILiu, B. / Li, Z.-t. / Li, Y. / Li, Z.-c. et al. | 2005
- 149
-
A SSFNet-based network worm test-bedJing, T. / Zhou, Q.-g. / Wu, W.-z. et al. | 2005
- 153
-
Witty worm propagation and simulation in scale-free networksZhang, Y.-k. / Wang, F.-w. / Zhang, Y.-q. / Ma, J.-f. et al. | 2005
- 158
-
Application and research of bloom filter in firewallZou, Q.-b. / Wu, W. / Li, Z.-t. et al. | 2005
- 163
-
Design and implementation of computing resource management based on the SOGSASong, L. / Hu, L.-s. / Xiao, F. / Xiang, C.-h. et al. | 2005
- 167
-
Personal metasearch engineYuan, F.-y. / Yu, H. et al. | 2005
- 171
-
Improving on rumoring mongering protocol in gnutella networkLi, J.-c. / Zhao, Z.-q. et al. | 2005
- 174
-
The realization of single sign-on in campus information portalRun-qiu, L. / Li-qiu, T. et al. | 2005
- 178
-
Using RBAC model in access control of campus information portalTan, L.-q. / Huang, Y.-b. / Fei, Y.-p. et al. | 2005
- 182
-
An implementation of CA system in JavaZhou, M. / Zhang, B. / Li, X.-n. et al. | 2005
- 185
-
The realization and application of data mining system based on campus networkMeng, H.-d. / Song, Y.-c. / Huang, T.-z. et al. | 2005
- 189
-
The realization of campus network Web information management platformTan, L.-q. / Fei, Y.-p. / Huang, Y.-b. et al. | 2005
- 193
-
Construct strategy and implementation of E-card system in digital campusXi, J. / Lu, Z.-x. / Zhu, X.-h. et al. | 2005
- 197
-
Distributing keys for secure communication in ad hoc networks: a probabilistic approachWu, W. / Zou, Q.-b. et al. | 2005
- 202
-
The application of GSM technology in remote meter-reading system of heat-supply networkLu, L.-l. / Zhao, Y.-s. / Hou, Z. / Zhu, J. / Zhang, W.-j. / Chu, Y.-l. et al. | 2005
- 205
-
An efficient VLR database failure recovery schemeYu, D.-j. / Liu, C.-x. / Zhu, K.-y. et al. | 2005
- 209
-
Study of channel estimation in OFDM-based broadband wireless access systemXing, Y.-h. / Fan, X.-n. et al. | 2005
- 213
-
Evaluation technology based on norros formula for self-similar video trafficLi, Y. / Li, Z.-t. / Liu, B. et al. | 2005
- 217
-
Analyses and research on multicast video tool-VICChen, Y. / Zhang, X. / Li, C.-r. / Li, X. et al. | 2005
- 221
-
Bandwidth constraint model for MPLS diffserv-aware TEXu, X.-x. et al. | 2005
- 226
-
Interpolation algorithm's implement on video terminalXu, H.-y. / Wang, F. et al. | 2005
- 230
-
Deblocking filter algorithm optimization in H26LLiu, D.-j. / Deng, Z.-l. / Cui, Y.-s. et al. | 2005
- 234
-
Performance analysis based on TCP in hierarchical MIPv6 with fast handoverHe, J. / Zhou, J. et al. | 2005
- 238
-
IPv6 network simulation environment based on SNMP agentRen, X.-t. / Zhao, X.-y. / Ma, Y. et al. | 2005
- 242
-
IPv6-based information appliance applicationChen, P. / Cui, J. / Song, W.-j. / Zhou, C.-l. / Zhang, B. et al. | 2005
- 247
-
Campus networks access in IPv6 backbone environmentZhou, Y. / Gong, J. et al. | 2005
- 251
-
Design and implementation of IPv6-based network chatting systemQiu, Q.-j. / Wang, K. / Zeng, J. / Li, Z.-g. et al. | 2005
- 255
-
A design of simplified IPv6 stack based on embedded systemLi, X. / Li, Y.-z. / Yu, G.-h. et al. | 2005
- 259
-
Distributed computational resource managementJi, L. / Yang, Y.-x. / Wang, S.-h. et al. | 2005
- 264
-
Design and implementation of file dispatcher in distributed resource manage systemWang, P. / Ai, F. / Wu, Y.-p. et al. | 2005
- 267
-
Web services oriented application integrationRen, X.-x. / Zhang, B. / Li, X.-n. et al. | 2005
- 271
-
Design and implementation of CERNET payment platformBian, X.-w. / Hu, S. / Wang, S. / Liu, X.-b. / Wang, X.-q. et al. | 2005
- 275
-
The preprocessing technique of E-commerce data miningGuo, W.-g. et al. | 2005
- 279
-
Application of code generation in E-business development platformZhang, G.-z. / Wu, Q.-y. et al. | 2005
- 284
-
Design and implementation of a web-based feature extraction search engineChun-yan, Q. / Tie-li, S. et al. | 2005
- 289
-
Research and implemention of parallel particle swarm optimization algorithmZhang, L. / Yang, B. et al. | 2005
- 293
-
A topology-aware peer-to-peer network based on small-world modelJiang, J.-j. / Wang, W.-n. et al. | 2005