期刊文献+

关于无线网络加密技术的分析与研究 被引量:2

原文传递
导出
摘要 21世纪,无线网络的时代,它给我们的生活带来了极大的方便,但绝大多数人可能都会遇到笔记本连接不上无线网的情况,而别人的笔记本却可正常连接,文章以JCGJHR-N835R无线路由器为例具体介绍原因及解决办法。
作者 张昆
出处 《信息与电脑(理论版)》 2012年第8期78-79,共2页 China Computer & Communication
  • 相关文献

参考文献2

二级参考文献9

  • 1Sen S, Spatscheck O, Wang D. Accurate, scalable in-network identification of P2P traffic using application signatures[C]//in Proceedings of the 13th International Conference on World Wide Web. New York, 2004.
  • 2Angelo Spognardi, Alessandro Lucarelli. A methodology for P2P file-sharing traffic detection[ C]//in Proceedings of the 2005 Second International Workshop on Hot Topics in Peer-to-Peer Systems (HOT-P2P05). 2005.
  • 3Karagiannis T, Broido A, Brownlee N. Is P2P dying or just hiding? [ C]// IEEE Global Telecommunications Conference Proceeding, v3, Institute of Electrical and Electronics Engineers Inc. Dallas, TX, 2004:1532 - 1538.
  • 4Sen S, Spatscheck O, Wang D. Accurate scalable in network identification of P2P traffic using application signatures [ C ] ff Proceedings of WWW Conference. NY: ACM, 2004: 512-521.
  • 5Karagiannis T, Broido A, Brownlee N, et al. File sharing in the Internet. a characterization of P2P traffic in the backbone [OB/OL]. 2004 [2007-01-15 ]. http://www. cs. ucr. edu/- tkarag.
  • 6Kostas Pagiamtzis, Ali Sheikholeslami. Content addressable memory (CAM) circuits and architectures: a tutorial and survey [J]. IEEE Journal of Solid-State Circuits, 2006, 41(3): 712-727.
  • 7Mahajan R, Floyd S, Wetherall D. Controlling high- bandwidth flows at the congested router [ C]//ICNP 2001. Washington: IEEE, 2001: 192.
  • 8Padhye J, Firoiu V, Towsley D, et al. Modeling TCP throughput:a simple model and its empirical validation [J ]. IEEE/ACM Trans on Networking, 2000, 8 (2) : 133-145.
  • 9Yu F, Katz R, Lakshman T. Gigabit rate packet pattern matching using TCAM [ C] // ICNP 2004. Washington: IEEE, 2004: 174-183.

共引文献26

同被引文献4

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部