期刊文献+

基于P2P的多媒体流过滤技术的研究与分析

Research and Analysis of Multimedia Stream Filtration Technology Base on P2P
下载PDF
导出
摘要 现有过滤系统中绝大多数方案都采用了传统的过滤技术,这些过滤技术无法制止不良多媒体信息在网络上传播。基于此,提出了一种基于内容的分布式多媒体流过滤系统的模型,该系统采用内容识别与包过滤相结合的方式,让内容识别过程与包过滤规则匹配并行进行,实现过滤系统的实时性;同时该系统设计的补偿Agent在屏蔽非法信息的同时,保证了多媒体文件的完整性。 The traditional filtration technologies are is widely used in the vast majority of progames in the existing filtration system. Whereas the traditional technologies can not stop the spread of non - performing multimedia information in the internet. This paper proposes a model of a distributed content - based filtering system of multimedia stream. The system realizes the realtime of filtering system where the content identifieaiton process and packet filtration can be done at the same time. The Agent compensation in the sytem shields the illegal information and ensures the integrity of multimedia files.
作者 伍红华
出处 《黄石理工学院学报》 2009年第1期24-26,35,共4页 Journal of Huangshi Institute of Technology
关键词 P2P 多媒体流 实时过滤 分布式通信 P2P multimedia stream realtime filtering distributed communication
  • 相关文献

参考文献5

二级参考文献18

  • 1Parameswaran, M. ,Susarla, A. , Whinston. P2P Networking: An Information Sharing Ahemative [ J ]. IEEE Computer Journal, 2001,34 : 31 - 38
  • 2Shirky C. Peer- to- Peer: Harnessing the Benefits of a Disruptive Technology/Listening to Napster[ M]. I. A. Oram (ed.) , O'Reilly & Associates ,2001
  • 3Konstantinos G. Zerfiridis: Fault Tolerant Peer- to - Peer Dissemination Network [ M ]. Euro - Par 2003, 1257 - 1264
  • 4Elango Ganesan,Dhirj K Pradhan. The Hyper - Debruijn networks : Scalable versatile architecture [ J ]. IEEE Trans on Parallel and Distributed Systems, 1993,14 (9) :962 - 978
  • 5Gupta D,Buchheim T,Feinstein B,et al.IAP:Intrusion alert protocol[N].draft-ietf-idwg-iap-05,2001-03-05.
  • 6Douglas R Stinson.Cryptography theoy and practice[M].Beijing:Publishing House of Electronics Industry,2002.135-139.
  • 7Davies D W.Advances in cryptology-eurocrypt91 [C].Berlin:Springer-Verlag,1991.328-336.
  • 8Mell P,Marks D,McLarnon M.A denial of service resistant intrusion detection architecture[J].Computer Networks.2000,34(4):641-658.
  • 9Curry D,Dehar H.Intrusion detection message exchange format data model and extensible markup language(XML)documenttype definition[N].draft-ietf-idwg-idmef-xml-03,2001- 02-03.
  • 10SELPK AA,UZUN E,PARIENTE MR.A Reputation-Based Trust Management System for P2P Networks[A].IEEE International Symposium on Cluster Computing and the Grid[C].2004

共引文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部