期刊文献+
共找到45篇文章
< 1 2 3 >
每页显示 20 50 100
本学科的一级学科名称应顺势易名 被引量:9
1
作者 孟广均 《图书馆论坛》 CSSCI 北大核心 2006年第6期1-2,30,共3页
作者根据自己对美、英、澳、日图书馆与情报学教育的调研指出,当前国际该领域的基本态势是已从图书馆学——经图书馆与情报学——到由information引领的格局,同时院系名称也多已改为由information引领的院系,但仍都被归入图书馆学领域... 作者根据自己对美、英、澳、日图书馆与情报学教育的调研指出,当前国际该领域的基本态势是已从图书馆学——经图书馆与情报学——到由information引领的格局,同时院系名称也多已改为由information引领的院系,但仍都被归入图书馆学领域。国内也是学科名称与院系名称不一致。当此有关职能机构正主持修订学科专业目录的当口,紧急建议用能反映本学科基本特性的“信息资源管理”(IRM)一级学科名称取代现在的“图书馆、情报与档案管理”一级学科名称。最后还对IRM的基本内涵、学科体系、课程分类等发表了自己的看法。 展开更多
关键词 图书馆与情报学 教育学科 系名 一级学科 信息资源管理
下载PDF
Phylogenetic Relationships among 12 Species of Tetrigidae (Orthoptera:Tetrigoidea) Based on Partial Sequences of 12S and 16S Ribosomal RNA 被引量:11
2
作者 陈爱辉 蒋国芳 《Zoological Research》 CAS CSCD 北大核心 2004年第6期510-514,共5页
Mitochondrial 12S and 16S ribosomal RNA genes sequences were sequenced using dye-labeled terminator on an ABI 377 automated sequencer in 11 individuals and 1 species' sequences were gained from GenBank,representin... Mitochondrial 12S and 16S ribosomal RNA genes sequences were sequenced using dye-labeled terminator on an ABI 377 automated sequencer in 11 individuals and 1 species' sequences were gained from GenBank,representing 6 genera of family Tetrigidae.The collated sequences were aligned using Clustal X version 1.81 and then,the sequence variability and heredity distances based on Kimura 2-parameter model were calculated using Mega 2.1.In obtained sequences (736 bp),the average A+T content is 73.9%,ranging from 71.2% to 77.5%;the overall G+C content is 26.1%,ranging from 22.5% to 28.8%.Based on alignment of the combined sequences,185 parsimony-informative sites were revealed in 755 available base pairs.Phylogenetic trees were reconstructed using NJ,MP and ML methods with Cylindraustralia kochii as outgroup.The results indicated that the monophyletic nature of Tetrix is questioned and suggest that T.tubercarina may be given tribal rank.Our results also show that Coptltettix huanjiangensis and C.gongshanensis are the same species,i.e.Coptltettix gongshanensis Zheng,and C.huanjiangensis is the synonyms of C.gongshanensis. 展开更多
关键词 TETRIGIDAE Phylogeny 12S rRNA gene 16S rRNA gene
下载PDF
An Updated Checklist of the Birds of Jiangxi,China 被引量:2
3
作者 涂飞云 韩卫杰 +3 位作者 孙志勇 刘晓华 黄晓凤 黄挺 《Agricultural Science & Technology》 CAS 2016年第5期1183-1199,1210,共18页
Complete checklist records are essential to understand regional bird diversity.We update the checklist of the bird species of Jiangxi,China based on numerous reported documents.The updated checklist of the bird specie... Complete checklist records are essential to understand regional bird diversity.We update the checklist of the bird species of Jiangxi,China based on numerous reported documents.The updated checklist of the bird species of Jiangxi shows that there are 536 bird species in Jiangxi,which belong to 21 orders,74 families,246 genera.And 48.7% of them are Passeriformes species and 12.3% are Charadriiformes species.Fifty species are classified as threatened.Fourteen of these species are grade I nationally protected wild animals,and 72 species are grade II nationally protected wild animals.In addition,fauna analyses indicate that the Palearctic realm(47.7%) is dominant.As for distribution type,the Oriental type is dominant.Considering the fauna of resident birds,the Oriental realm is dominant.Additionally,the distribution of several species was revised in the checklist. 展开更多
关键词 CHECKLIST Bird species FAUNA JIANGXI
下载PDF
Simulation of pavement roughness based on time domain model 被引量:2
4
作者 钮凯健 李昶 《Journal of Southeast University(English Edition)》 EI CAS 2010年第3期475-479,共5页
In order to describe pavement roughness more intuitively and effectively, a method of pavement roughness simulation, i.e., the stochastic sinusoidal wave, is introduced. The method is based on the primary idea that pa... In order to describe pavement roughness more intuitively and effectively, a method of pavement roughness simulation, i.e., the stochastic sinusoidal wave, is introduced. The method is based on the primary idea that pavement roughness is denoted as the sum of numerous sines or cosines with stochastic phases, and uses the discrete spectrum to approach the target stochastic process. It is a discrete numerical method used to simulate pavement roughness. According to a given pavement power spectral density (PSD) coefficient, under the condition that the character of displacement frequency based on the time domain model is in accordance with the given pavement surface spectrum, the pavement roughness is optimized to stochastic equivalent vibrations by computer simulation, and the curves that describe pavement roughness under each grade are obtained. The results show that the stochastic sinusoidal wave is suitable for simulation of measured pavement surface spectra based on the time domain model. The method of the stochastic sinusoidal wave is important to the research on vehicle ride comfort due to its rigorous mathematical derivation, extensive application range and intuitive simulation curve. Finally, a roughness index defined as the nominal roughness index (NRI) is introduced, and it has correlation with the PSD coefficient. 展开更多
关键词 pavement roughness stochastic sinusoidal wave stochastic process power spectral density (PSD) coefficient time domain nominal roughness index (NRI)
下载PDF
“魁”与“盔”——中古“名”、“物”系联例释 被引量:5
5
作者 张小艳 《复旦学报(社会科学版)》 CSSCI 北大核心 2013年第4期26-34,166,共9页
学界关于中古名物的研究,大多着眼于将文献、图像结合起来考证一个个独立的"名"与"物"的契合与统一,很少从历时的角度探究同"物"异"名"或同"名"异"物"之间"名"... 学界关于中古名物的研究,大多着眼于将文献、图像结合起来考证一个个独立的"名"与"物"的契合与统一,很少从历时的角度探究同"物"异"名"或同"名"异"物"之间"名"、"物"关系的变更与交替,忽略了"名"、"物"在不同历史时期的发展与变化,割裂了其间内在的有机联系。本文以"魁"与"盔"为例,从"物"的形制、"名"的音义上寻绎其在中古时期"新陈代谢"的具体过程,藉此阐明中古名物研究中异"名"同"物"系联的旨趣和意义。 展开更多
关键词 异“”同“物” 例释
原文传递
灵芝孢子与肝吸虫卵的鉴别
6
作者 肖景珠 《南京部队医药》 1999年第2期44-44,共1页
灵芝草系名贵中药,其孢子呈棕褐色、卵形。我们在粪常规涂片检查中发现灵芝孢子与肝吸虫卵非常相似,曾误认其为肝吸虫卵。现报告如下。 1 病案摘要 患者,女、27岁,1998-03曾被诊断为结肠癌肝脏转移,保守治疗。粪常规检查时发现不认识的... 灵芝草系名贵中药,其孢子呈棕褐色、卵形。我们在粪常规涂片检查中发现灵芝孢子与肝吸虫卵非常相似,曾误认其为肝吸虫卵。现报告如下。 1 病案摘要 患者,女、27岁,1998-03曾被诊断为结肠癌肝脏转移,保守治疗。粪常规检查时发现不认识的虫卵,误认为肝吸虫卵。患者于1998-10来我院门诊,粪常规初检时也发现有“肝吸虫卵”,经询问病史及服药史,得知患者常服用灵芝粉(因其家种有灵芝,刮下其粉口服)。经与其对照,证实粪涂片所见“肝吸虫卵”实为灵芝孢子。 展开更多
关键词 肝吸虫卵 灵芝孢子 灵芝草 灵芝粉 常规涂片 棕黄色 小盖 系名 服药史 卵形
下载PDF
Proxy signature scheme for ID-based original signers and certificate-based proxy signers
7
作者 辛向军 孙垒 《Journal of Southeast University(English Edition)》 EI CAS 2008年第3期318-321,共4页
To realize delegation between different users in a mixed cryptosystem,a proxy signature scheme for ID-based original signers and certificated-based proxy signers(PSS-ID-CER)is defined.Using the bilinear properties o... To realize delegation between different users in a mixed cryptosystem,a proxy signature scheme for ID-based original signers and certificated-based proxy signers(PSS-ID-CER)is defined.Using the bilinear properties of the pairings and the characters of key generations of certificate-based cryptosystems and ID-based cryptosystems,a construction for such a scheme is also presented.To prove the security of the proposed scheme,a general security model for this scheme under adaptive chosen-PKG,chosen-ID,chosen-delegation,chosen-ProxySigner-public-key,chosen-proxy-key and chosen-message attack is defined.The proposed scheme is provably secure under the random oracle model and the hardness assumption of computational Diffie-Hellman problem. 展开更多
关键词 proxy signature ID-based cryptosystem bilinear pairings
下载PDF
Hierarchical Domain Assignment BaseC on Word-Gloss 被引量:1
8
作者 朱朝勇 黄河燕 史树敏 《China Communications》 SCIE CSCD 2012年第3期19-27,共9页
This paper proposes a hierarchical word domain assignment algorithm to automatically build domain dictionaries from Machine-Readable Dictionary(MRD).The process for word domain assignment can be divided into three ste... This paper proposes a hierarchical word domain assignment algorithm to automatically build domain dictionaries from Machine-Readable Dictionary(MRD).The process for word domain assignment can be divided into three steps:1) Hierarchical structure constructing;2) Classifier training;3) Word domain assigning.Compared with the traditional methods,the hierarchical word domain assignment algorithm enhances the accuracy of word domain assignment while reducing human efforts on collecting corpus.Experiments on WordNet 2.0 show that 62.53% of the first domain labels are matched with the WordNet Domains 3.0 by using gloss-based word domain assignment,and the performance can be further improved by utilizing the hierarchical relationships among the domain sets. 展开更多
关键词 natural language processing domaindictionary hierarchical classification domain as-sigrmaent WORDNET MRD
下载PDF
A kind of signature scheme based on class groups of quadratic fields 被引量:1
9
作者 董晓蕾 曹珍富 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2004年第6期583-587,共5页
Quadratic-field cryptosystem is a cryptosystem built from discrete logarithm problem in ideal class groups of quadratic fields(CL-DLP). The problem on digital signature scheme based on ideal class groups of quadratic ... Quadratic-field cryptosystem is a cryptosystem built from discrete logarithm problem in ideal class groups of quadratic fields(CL-DLP). The problem on digital signature scheme based on ideal class groups of quadratic fields remained open, because of the difficulty of computing class numbers of quadratic fields. In this paper, according to our researches on quadratic fields, we construct the first digital signature scheme in ideal class groups of quadratic fields, using q as modulus, which denotes the prime divisors of ideal class numbers of quadratic fields. Security of the new signature scheme is based fully on CL-DLP. This paper also investigates realization of the scheme, and proposes the concrete technique. In addition, the technique introduced in the paper can be utilized to realize signature schemes of other kinds. 展开更多
关键词 quadratic-field cryptosystem digital signature ideal class groups discrete logarithm problem
下载PDF
MR-CLOPE: A Map Reduce based transactional clustering algorithm for DNS query log analysis 被引量:2
10
作者 李晔锋 乐嘉锦 +2 位作者 王梅 张滨 刘良旭 《Journal of Central South University》 SCIE EI CAS CSCD 2015年第9期3485-3494,共10页
DNS(domain name system) query log analysis has been a popular research topic in recent years. CLOPE, the represented transactional clustering algorithm, could be readily used for DNS query log mining. However, the alg... DNS(domain name system) query log analysis has been a popular research topic in recent years. CLOPE, the represented transactional clustering algorithm, could be readily used for DNS query log mining. However, the algorithm is inefficient when processing large scale data. The MR-CLOPE algorithm is proposed, which is an extension and improvement on CLOPE based on Map Reduce. Different from the previous parallel clustering method, a two-stage Map Reduce implementation framework is proposed. Each of the stage is implemented by one kind Map Reduce task. In the first stage, the DNS query logs are divided into multiple splits and the CLOPE algorithm is executed on each split. The second stage usually tends to iterate many times to merge the small clusters into bigger satisfactory ones. In these two stages, a novel partition process is designed to randomly spread out original sub clusters, which will be moved and merged in the map phrase of the second phase according to the defined merge criteria. In such way, the advantage of the original CLOPE algorithm is kept and its disadvantages are dealt with in the proposed framework to achieve more excellent clustering performance. The experiment results show that MR-CLOPE is not only faster but also has better clustering quality on DNS query logs compared with CLOPE. 展开更多
关键词 DNS data mining MR-CLOPE algorithm transactional clustering algorithm Map Reduce framework
下载PDF
Hybrid Detection and Tracking of Fast-Flux Botnet on Domain Name System Traffic 被引量:2
11
作者 邹福泰 章思宇 饶卫雄 《China Communications》 SCIE CSCD 2013年第11期81-94,共14页
Fast-flux is a Domain Name System(DNS)technique used by botnets to organise compromised hosts into a high-availability,loadbalancing network that is similar to Content Delivery Networks(CDNs).Fast-Flux Service Network... Fast-flux is a Domain Name System(DNS)technique used by botnets to organise compromised hosts into a high-availability,loadbalancing network that is similar to Content Delivery Networks(CDNs).Fast-Flux Service Networks(FFSNs)are usually used as proxies of phishing websites and malwares,and hide upstream servers that host actual content.In this paper,by analysing recursive DNS traffic,we develop a fast-flux domain detection method which combines both real-time detection and long-term monitoring.Experimental results demonstrate that our solution can achieve significantly higher detection accuracy values than previous flux-score based algorithms,and is light-weight in terms of resource consumption.We evaluate the performance of the proposed fast-flux detection and tracking solution during a 180-day period of deployment on our university’s DNS servers.Based on the tracking results,we successfully identify the changes in the distribution of FFSN and their roles in recent Internet attacks. 展开更多
关键词 domain name system BOTNET fast-flux
下载PDF
A Novel Location Management Scheme based on DNS in Proxy Mobile IPv6
12
作者 Qiu Feng Li Xiaoqian Su Wei Zhang Hongke 《China Communications》 SCIE CSCD 2010年第3期43-52,共10页
Proxy Mobile IPv6 (PMIPv6) is designed to provide a network-based localized mobility management protocol, but it does not handle the global mobility of hosts. In this paper, we propose a location management scheme bas... Proxy Mobile IPv6 (PMIPv6) is designed to provide a network-based localized mobility management protocol, but it does not handle the global mobility of hosts. In this paper, we propose a location management scheme based on Domain Name System (DNS) for PMIPv6 which can support global mobility by using DNS as a location manager. In addition, to support large numbers of mobile terminals and enhance network scalability a paging extension scheme is introduced to PMIPv6. To evaluate the proposed location management scheme, we establish an analytical model, formulate the location update cost and the paging cost, and analyze the influence of the different factors on the total signaling cost. The performance results show that our proposed scheme outperforms the basic PMIPv6 under various parameters in terms of reducing the signaling overhead and the proposed scheme reduces signaling overhead compared to the basic PMIPv6. 展开更多
关键词 COMPONENT Proxy Mobile IPv6 location manager mobility management PAGING
下载PDF
Restricted common data in anonymous E-cash system 被引量:1
13
作者 张向军 陈克非 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2006年第5期595-600,共6页
Discuss the problem of infinite increasing coin list in anonymous E-cash systems, which reduce the efficiency of whole system greatly. Though some methods are suggested, no one can solve the problem with high efficien... Discuss the problem of infinite increasing coin list in anonymous E-cash systems, which reduce the efficiency of whole system greatly. Though some methods are suggested, no one can solve the problem with high efficiency and flexibility. Here, we use the technique of adding information in blind signatures to deal with this problem. Through adding timestamp in signatures, we can separate the valid period of all used coins into pieces. Only the coins in the last stage are recorded. So the scale of the coins list is controlled. We also analyze the anonymity of these data, and add some indispensable restrictions to them. These restrictions can ensure that the imported data don’t break the anonymity of the customers. In order to fulfill these qualifications, we lead to the concept of restricted common data (RCD). Furthermore, we propose two schemes to add RCD in the blind signature. The simple one is easy to implement, while the complex one can note the value of the coin. The usage of RCD leads to little additional cost, as well as maintaining the anonymity of customers. This method fits for most kinds of anonymous E-cash systems. 展开更多
关键词 blind signatures anonymity E-cash system restricted common data
下载PDF
Identity-based threshold key-insulated signature 被引量:3
14
作者 Chen Jianhong Chen Kefei Long Yu 《High Technology Letters》 EI CAS 2012年第3期275-280,共6页
Due to the compromise of the security of the underlying system or machine stonng the key, exposure of the private key can be a devastating attack on a cryptosystem. Key insulation is an important technique to protect ... Due to the compromise of the security of the underlying system or machine stonng the key, exposure of the private key can be a devastating attack on a cryptosystem. Key insulation is an important technique to protect private keys. To deal with the private (signing) key exposure problem in identity-based signature systems, we propose an identity-based threshold key-insulated signature (IBTKIS) scheme. It strengthens the security and flexibility of existing identity-based key-insulated signature schemes. Our scheme' s security is proven in the random oracle model and rests on the hardness of the computational Diffie-Helhnan problem in groups equipped with a pairing. To the best of our knowledge, it is the first IBTKIS scheme up to now. 展开更多
关键词 threshold key-insulated SIGNATURE random oracle model
下载PDF
Enhancement in Ad hoc on Demand Distance Vector (AODV) Routing Protocol Security 被引量:2
15
作者 王翠荣 杨孝宗 高远 《Journal of Donghua University(English Edition)》 EI CAS 2005年第3期18-22,共5页
Ad-hoc networking has mainly been associated with military battlefield networks. Security has received considerably less attention and the issue needs to be addressed before any successful applications will appear. Du... Ad-hoc networking has mainly been associated with military battlefield networks. Security has received considerably less attention and the issue needs to be addressed before any successful applications will appear. Due to the insecure nature of the wireless link and their dynamically changing topology, wireless ad-hoc networks require a careful and security-oriented approach for designing routing protocols. In this paper, an AODV-based secure routing protocol- ENAODV is presented. A speed-optimized digital signature algorithm is integrated into the routing protocol. The protocol algorithm is implemented with NS-2. The security of the protocol is analyzed. The simulating results show that the performances of ENAODV protocol, such as average node energy consumption, packet delay and packet delivery is nearly the same as standard AODV protocol. 展开更多
关键词 act-hoc network secure routing protocol Blowfish Cryptography digital signature
下载PDF
A Study of Three Variants of Gerund Construction from the Contrastive Perspective of Social and Natural Academic Abstracts on Construction Grammar Theory
16
作者 Yan JIN Mingtuo Yang 《Chinese Journal of Applied Linguistics》 2020年第2期219-230,250,共13页
English gerund construction is a system composed of 3 variants, including "Gerund + Φ", "Gerund + of + NP", and "Gerund + NP". The noun and verb attributes of the 3 variants are recursiv... English gerund construction is a system composed of 3 variants, including "Gerund + Φ", "Gerund + of + NP", and "Gerund + NP". The noun and verb attributes of the 3 variants are recursive, and in theory their frequencies vary regularly in different styles. An abstract is placed before the beginning of an academic papers, which has the basic characteristics of conciseness and generalization, and has special requirements for the use of gerunds. The purpose of this study was to empirically explore the system of gerund construction in abstracts of natural science and social science papers, and to specifically explore the inherent characteristics of noun and verb properties of the 3 variants. For this purpose, two corpora were constructed, one is about abstracts of natural science papers, and the other is about abstracts of social science papers. Finally, the results of chi-square test showed that there was no significant difference in the frequencies of the 3 variants in the abstracts of natural science and social science papers, and the two corpora can be studied as a whole. In the combined corpus, there were significant differences in the frequencies of the 3 gerund variants. The frequencies of these 3 variants and their gerund properties showed a recursive change. 展开更多
关键词 gerund construction gerund variants Construction Grammar NOMINALIZATION gerund system
下载PDF
Nomenclature for lunar features at the Chang'e-3 landing site
17
作者 Zhoubin Zhang Chunlai Li +1 位作者 Wei Zuo Xingguo Zeng 《Acta Geochimica》 EI CAS CSCD 2017年第2期213-223,共11页
Nomenclatures for lunar features always accompany the progresses of human lunar exploration,which has an important dual meaning in culture and science. The naming of lunar features not only can commemorate the outstan... Nomenclatures for lunar features always accompany the progresses of human lunar exploration,which has an important dual meaning in culture and science. The naming of lunar features not only can commemorate the outstanding contributions of academics,masters in various fields, and popularize the traditional cultures of ethnic groups all over the world, but also have a critical function of providing accurate indicative information on features with special morphology, origin, nature and scientific value. However, nomenclature for features at the Chang'e-3 landing site, which has a more arbitrary form without many constrains posed by a uniformed system, is unlike the features for other morphological units.This paper originated from the actual needs for the description of scientific exploration activities, interpretation of scientific research and dissemination of scientific results. Some prominent morphological units with great scientific importance and identification purpose were chosen from the images taken by the terrain camera, panorama cameras and landing camera onboard the Chang'e lander and Yutu rover. A nomenclature system was established under the three enclosures, four quadrants and twenty-eight lunar lodges' system of the Chinese ancient sky division method. Finally, a standard feature names set waspublished after some necessary approval procedures by the International Astronomical Union. 展开更多
关键词 MOON Chang'e-3 Landing site Lunarfeature nomenclature
下载PDF
Signature Verification for Multiuser Online Kanji Learning System
18
作者 Jungpil Shin Junichi Sato 《Computer Technology and Application》 2012年第3期211-218,共8页
Multiuser online system is useful, but the administrator must be nervous at security problem. To solve this problem, the authors propose applying signature verification to multiuser online system. At the authors' res... Multiuser online system is useful, but the administrator must be nervous at security problem. To solve this problem, the authors propose applying signature verification to multiuser online system. At the authors' research, they attempt adding signature verification function based on DP (Dynamic Programming) matching to existing multiuser online kanji learning system. In this paper, the authors propose the construction of the advance system and methods of signature verification, and evaluate performance of those signature verification methods that difference is combination of using features. From signature verification's experimental results, the authors adopted to use writing velocity and writing speed differential as using feature to verify the writer for the system. By using signature database which is construct with 20 genuine signatures and 20 forged signatures with 40 writers and written mostly by English or Chinese literal, experimental results of signature verification records 12.71% as maximum EER (Equal Error Rate), 6.00% as minimum EER, and 8.22% as average EER. From mentioned above, the authors realized to advance the reliability and usefulness of the multiuser online kanji learning system. 展开更多
关键词 Signature verification character learning method dynamic programming.
下载PDF
Village Network Centrality in Rural Tourism Destination:A Case from Yesanpo Tourism Area,China
19
作者 ZHANG Rui-ying XI Jian-chao +2 位作者 WANG Shou-kun WANG Xin-ge GE Quan-sheng 《Journal of Mountain Science》 SCIE CSCD 2015年第3期759-768,共10页
With the development of rural tourism, the cooperation of villages has become very important.Identifying the status and importance of each village can contribute to better understanding of the integrated rural tourism... With the development of rural tourism, the cooperation of villages has become very important.Identifying the status and importance of each village can contribute to better understanding of the integrated rural tourism management and sustainable rural tourism development. The research focused on 46 villages of Yesanpo scenic spot in China(39°35'-40°north latitude, and 115°16'- 115°30' east longitude). Integrating the method of Geographical Information System(GIS) and social network analysis, the spatial centrality and interrelation of each village in Yesanpo tourism destination were evaluated. The results showed that Xinggezhuang is the spatial core village of the whole 46 villages in Yesanpo tourism areas; Xinggezhuang, Nanzhuang, Zhenchang, Daze, Liujiahe and Zishikou are sub-core villages of the six tourism spots. Magezhuang, Ximagezhuang, Eyu, Zishikou, Daze, Shangzhuang, Zhenchang and Xiazhuang should be support of the core villages, which provide subsidiary services and connects with other nodes. The results also indicated that the study of the village centrality will contribute to build an integrated hierarchy structure and to provide sufficient basis for further development of rural tourism destination. 展开更多
关键词 Network analysis CENTRALITY Ruraltourism Yesanpo
下载PDF
Impact of public name resolving services on Akamai
20
作者 秦臻 Xiao Chunjing Li Lemin 《High Technology Letters》 EI CAS 2013年第4期359-363,共5页
To enhance user perceived performance,Akamai' s content distribution network(CDN) utilizes the domain name system(DNS) effectively to redirect users to close-by content replicas over short time scale.The use of DN... To enhance user perceived performance,Akamai' s content distribution network(CDN) utilizes the domain name system(DNS) effectively to redirect users to close-by content replicas over short time scale.The use of DNS redirection has brought a significant advantage to Akamai' s CDN.However,the reliance on DNS also poses a fundamental threat to Akamai' s content distribution model.In particular,systematic evaluation and quantification illustrates the impact of recent emerging public DNS resolving services on Akamai' s CDN,including the degradation of corresponding user perceived performance and the benefit damnification of collaborating internet services providers(ISPs) that host Akamai's edge servers.The measurement demonstrates that a considerable penetration of public DNS resolving services(e.g.,OpenDNS and GoogleDNS) effectively corrupts the Akamai' s serving model,namely the large-scale server distribution and quick DNS redirection. 展开更多
关键词 content distribution network (CDN) domain name system (DNS) public DNS resolving services DNS redirection
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部