期刊文献+
共找到23篇文章
< 1 2 >
每页显示 20 50 100
网络行为学研究综述 被引量:1
1
作者 余晓永 张倩 《宿州学院学报》 2009年第5期105-107,共3页
详细介绍了网络行为学的概念,并将网络行为分为微观行为和宏观行为两个类别,最后论述了网络测量在网络行为学研究中的重要地位和网络行为的研究方向。
关键词 计算机网络 网络行为学 网络测量
下载PDF
P2P网络行为学研究
2
作者 曹挚 姜淑娟 《计算机工程与设计》 CSCD 北大核心 2008年第14期3586-3588,3591,共4页
对等网络结构不断发展,网络中节点的行为逐渐成为影响网络效率的重要因素。激励、信誉和公平性已经成为对等网络中的三大难题,然而这三者都属于网络行为学的范畴。针对P2P网络行为学中的难题,提出了解决方法即在设计P2P系统的同时要兼... 对等网络结构不断发展,网络中节点的行为逐渐成为影响网络效率的重要因素。激励、信誉和公平性已经成为对等网络中的三大难题,然而这三者都属于网络行为学的范畴。针对P2P网络行为学中的难题,提出了解决方法即在设计P2P系统的同时要兼顾激励、信誉和公平性。并对这三者分别进行了分析比较,针对当今不同P2P结构中的节点行为进行了评价。最后进一步展望了P2P网络行为学的研究方向。 展开更多
关键词 对等网络 激励 信誉 公平性 网络行为学
下载PDF
网络测量及行为学研究综述 被引量:14
3
作者 程光 龚俭 丁伟 《计算机工程与应用》 CSCD 北大核心 2004年第27期1-8,共8页
随着互联网的发展,理解网络行为对于网络管理、规划和发展都有重要意义,网络流量测量是研究网络行为的基础。论文首先根据目前Internet发展的特点、网络管理的缺点和不足,分析网络行为学的研究难点和重点。将网络测量及行为学研究分成... 随着互联网的发展,理解网络行为对于网络管理、规划和发展都有重要意义,网络流量测量是研究网络行为的基础。论文首先根据目前Internet发展的特点、网络管理的缺点和不足,分析网络行为学的研究难点和重点。将网络测量及行为学研究分成测量、流量行为分析、端至端行为分析等三个方面,并分别从这三个方面的国内外研究状况进行分析总结。论文最后定义网络行为学的概念,并提出网络行为学的研究方向。 展开更多
关键词 计算机网络 网络行为学 综述 测量
下载PDF
“网络测量与行为学”课程教学探讨 被引量:1
4
作者 程光 《电气电子教学学报》 2011年第3期15-17,共3页
互联网的发展使得网络测量和行为分析成为监控、理解、认识网络进而实现对网络精细化管理的重要方法。我院于2009年开始为研究生开设了"网络测量与行为学"课程。本文探讨了该课程设置的必要性和教学方法,并给出该课程所涉及... 互联网的发展使得网络测量和行为分析成为监控、理解、认识网络进而实现对网络精细化管理的重要方法。我院于2009年开始为研究生开设了"网络测量与行为学"课程。本文探讨了该课程设置的必要性和教学方法,并给出该课程所涉及的相关资料,以期吸引国内高校能够开设该课程,进而培养更多的网络测量与行为学相关人才。 展开更多
关键词 网络测量 网络行为学 方法
下载PDF
网络测量及其关键技术 被引量:55
5
作者 朱畅华 裴昌幸 +1 位作者 李建东 金旗 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2002年第6期813-818,共6页
网络测量对网络研究与发展十分重要.分析了网络测量的常用方法,论述了网络测量的体系结构和研究现状.同时还指出了端到端时延模型、"噪声"分组过滤、测试点最优选择、业务模型分析和时钟偏移影响的消除等网络测量的关键技术.... 网络测量对网络研究与发展十分重要.分析了网络测量的常用方法,论述了网络测量的体系结构和研究现状.同时还指出了端到端时延模型、"噪声"分组过滤、测试点最优选择、业务模型分析和时钟偏移影响的消除等网络测量的关键技术.最后说明网络测量在研究网络行为学、网络管理、网络安全和研究网络的新方法、新技术等方面的应用. 展开更多
关键词 网络 测量 主动测量 被动测量 网络行为学 INTERNET
下载PDF
基于异构系统的统一网络安全监控体系模型 被引量:7
6
作者 刘兰 李之棠 +1 位作者 李家春 梅成刚 《小型微型计算机系统》 CSCD 北大核心 2006年第9期1682-1686,共5页
针对大规模异构网络环境下安全行为的复杂性,现有的网络技术与管理缺少对海量原始数据的良好安全监控手段,本文提出构建统一的网络安全监控体系的思想,对各种异构数据源数据(审计日志和流量数据)进行标准化表示和整合,采用数据挖掘和小... 针对大规模异构网络环境下安全行为的复杂性,现有的网络技术与管理缺少对海量原始数据的良好安全监控手段,本文提出构建统一的网络安全监控体系的思想,对各种异构数据源数据(审计日志和流量数据)进行标准化表示和整合,采用数据挖掘和小波分析的方法对数据进行分析处理,通过关联规则、流量规则和规则序列模式分析出整个网络的运行情况,对系统分析结果给出可视化结论,调整安全策略以适应网络安全动态性和整体性. 展开更多
关键词 网络行为学 关联 数据挖掘 小波分析 监测
下载PDF
泊松采样在基于RMON的网络测量中的研究及实现 被引量:5
7
作者 田海燕 王换招 李玉鹏 《微电子学与计算机》 CSCD 北大核心 2003年第7期56-59,共4页
网络流量测量和分析是网络行为学研究的基础,文章通过对目前网络测量的技术及采样技术的分析研究,应用基于RMON的网络流量测量和泊松采样的方法,对RMON代理中探测到的网络流量数据进行采样、分析。文章对认识网络流量的一般规律,掌握网... 网络流量测量和分析是网络行为学研究的基础,文章通过对目前网络测量的技术及采样技术的分析研究,应用基于RMON的网络流量测量和泊松采样的方法,对RMON代理中探测到的网络流量数据进行采样、分析。文章对认识网络流量的一般规律,掌握网络行为的基本特征具有一定的参考价值。 展开更多
关键词 网络测量 RMON 泊松采样 网络行为学 计算机网络
下载PDF
TCP数据流的非对称性分析 被引量:2
8
作者 戴宣 丁伟 程光 《计算机工程》 CAS CSCD 北大核心 2007年第14期118-120,共3页
提出了一个面向TCP流属性的非对称性测度,包括该测度的定义和计算方法。并基于这个测度对CERNET的一个千兆省网边界的实际数据进行了分析。分析工作从流长度(报文数)和流字节数2个属性角度展开,利用一组函数对这些流属性的非对称测度进... 提出了一个面向TCP流属性的非对称性测度,包括该测度的定义和计算方法。并基于这个测度对CERNET的一个千兆省网边界的实际数据进行了分析。分析工作从流长度(报文数)和流字节数2个属性角度展开,利用一组函数对这些流属性的非对称测度进行了统计和分析,获得了一组有关的结论,可以用于与网络行为学有关的研究。 展开更多
关键词 TCP数据流 非对称性 流属性 测度 网络行为学
下载PDF
Different Epidemic Models on Complex Networks 被引量:6
9
作者 ZHANG Hai-Feng Michael Small FU Xin-Chu 《Communications in Theoretical Physics》 SCIE CAS CSCD 2009年第7期180-184,共5页
Models for diseases spreading are not just limited to SIS or SIR. For instance, for the spreading of AIDS/HIV, the susceptible individuals can be classified into different cases according to their immunity, and simila... Models for diseases spreading are not just limited to SIS or SIR. For instance, for the spreading of AIDS/HIV, the susceptible individuals can be classified into different cases according to their immunity, and similarly, the infected individuals can be sorted into different classes according to their infectivity. Moreover, some diseases may develop through several stages. Many authors have shown that the individuals' relation can be viewed as a complex network. So in this paper, in order to better explain the dynamical behavior of epidemics, we consider different epidemic models on complex networks, and obtain the epidemic threshold for each ease. Finally, we present numerical simulations for each case to verify our results. 展开更多
关键词 epidemic threshold scale-free network diseases spreading multiple-staged infectivity rate
下载PDF
Approach to Anomaly Traffic Detection in a Local Network
10
作者 王秀英 肖立中 邵志清 《Journal of Donghua University(English Edition)》 EI CAS 2009年第6期656-661,共6页
The research intends to solve the problem of the occupation of bandwidth of local network by abnormal traffic which affects normal user's network behaviors.Firstly,a new algorithm in this paper named danger-theory... The research intends to solve the problem of the occupation of bandwidth of local network by abnormal traffic which affects normal user's network behaviors.Firstly,a new algorithm in this paper named danger-theory-based abnormal traffic detection was presented.Then an advanced ID3 algorithm was presented to classify the abnormal traffic.Finally a new model of anomaly traffic detection was built upon the two algorithms above and the detection results were integrated with firewall.The firewall limits the bandwidth based on different types of abnormal traffic.Experiments show the outstanding performance of the proposed approach in real-time property,high detection rate,and unsupervised learning. 展开更多
关键词 clanger theory information enlropy ID3 algorithm abnormal traffic
下载PDF
Research on College Frustrated Students' Network Mentality and Behaviors
11
作者 Zichen YIN 《International Journal of Technology Management》 2015年第4期6-8,共3页
Network has not only become a habit and lifestyle for university student, but also brought all sorts of ethical misconducts and ethical issues in society. Based on the analysis of college students' frustrations, this... Network has not only become a habit and lifestyle for university student, but also brought all sorts of ethical misconducts and ethical issues in society. Based on the analysis of college students' frustrations, this paper explores the causes of network behavior anomie for college students, which mainly include: dissatisfaction in real communication, game addiction to the network, craving online pornography, and hooking on online shopping. In addition, it also investigates the ways to wipe out mental frustration in such a cyber era. These ways mainly are to strenzthen online education and management, to make psychological counseling, and to carry on frustration education. 展开更多
关键词 college students network behaviors causes of network behavior anomie ways to overcome mental frustration
下载PDF
An Empirical Research on the Behavior and Influencing Factors of College Students Network Course Learning
12
作者 YE Wei-jian 《Sino-US English Teaching》 2014年第6期411-418,共8页
"Using technology to support learning" gradually becomes the main trend of technology application and technology-curriculum integration at home and abroad. The empirical research based on newly-established universit... "Using technology to support learning" gradually becomes the main trend of technology application and technology-curriculum integration at home and abroad. The empirical research based on newly-established universities shows that college students' usage intention on network course and study behavior is not real. Study behavior of network course is passive and outside stimulation. They are more concerned about the usefulness and relative advantages of the learning mode in the network course learning; however, learning environment of the network course at present still is given on material and tool level. The institutions should, in compliance with the trend of higher education development in the world, actively build learning environment to meet the learning needs of students in the information age, deepen the reform of information technology application and curriculum based on the learner-centered concept, focus on the training of initiative learning of college students, put community impact into full play to promote the integration of the superiority of the material platform and initiative, and finally improve the efficiency and quality of teaching and education. 展开更多
关键词 college students network course study behavior INTENTION influencing factors
下载PDF
Bistability Analysis of Excitatory-Inhibitory Neural Networks in Limited-Sustained-Activity Regime
13
作者 倪赟 吴亮 +1 位作者 吴丹 朱士群 《Communications in Theoretical Physics》 SCIE CAS CSCD 2011年第12期1155-1160,共6页
Bistable behavior of neuronal complex networks is investigated in the limited-sustained-activity regime when the network is composed of excitatory and inhibitory neurons.The standard stability analysis is performed on... Bistable behavior of neuronal complex networks is investigated in the limited-sustained-activity regime when the network is composed of excitatory and inhibitory neurons.The standard stability analysis is performed on the two metastable states separately.Both theoretical analysis and numerical simulations show consistently that the difference between time scales of excitatory and inhibitory populations can influence the dynamical behaviors of the neuronal networks dramatically,leading to the transition from bistable behaviors with memory effects to the collapse of bistable behaviors.These results may suggest one possible neuronal information processing by only tuning time scales. 展开更多
关键词 neural networks BISTABLE
下载PDF
Sleeping of a Complex Brain Networks with Hierarchical Organization
14
作者 ZHANG Ying-Yue YANG Qiu-Ying CHEN Tian-Lun 《Communications in Theoretical Physics》 SCIE CAS CSCD 2009年第1期97-100,共4页
The dynamical behavior in the cortical brain network of macaque is studied by modeling each cortical area with a subnetwork of interacting excitable neurons. We characterize the system by studying how to perform the t... The dynamical behavior in the cortical brain network of macaque is studied by modeling each cortical area with a subnetwork of interacting excitable neurons. We characterize the system by studying how to perform the transition, which is now topology-dependent, from the active state to that with no activity. This could be a naive model for the wakening and sleeping of a brain-like system, i.e., a multi-component system with two different dynamical behavior. 展开更多
关键词 self-organized criticality hierarchical organization EEG-like wave cortical network SLEEPING
下载PDF
An Analysis of the Cognitive Constraints of Parody in the Context of Network Media
15
作者 CHANG Yan 《Sino-US English Teaching》 2016年第7期567-572,共6页
The language used in the context of network media features variation, flexibility, and comprehensiveness, in which parody is one of the most employed devices. Modern cognitive science prefers to take parody as a cogni... The language used in the context of network media features variation, flexibility, and comprehensiveness, in which parody is one of the most employed devices. Modern cognitive science prefers to take parody as a cognitive act rather than a sheer linguistic modification act, which has provided a new prospective for further research about parody in the context of network media. This paper aims to probe into the cognitive constraints in the mechanism of parody in the context of network media, in hope to make a detailed explanation of the cognitive process of it and to strengthen the comprehension and appreciation of it. 展开更多
关键词 parody in the context of network media cognitive constraints cognitive realm
下载PDF
Evaluation on the Thermal Stability and Hazards Behaviors of ADVN Using Green Thermal Analysis Approach
16
作者 Chi-Min Shu Yi-Hong Chang Chen-Wei Chiu 《Journal of Civil Engineering and Architecture》 2016年第3期280-290,共11页
ADVN (2,2'-Azobis (2,4-dimethyl) valeronitrile), a free radical initiator, is widely applied for the polymerization reaction of polymers in the chemical industries. When ADVN releases free radical during the deco... ADVN (2,2'-Azobis (2,4-dimethyl) valeronitrile), a free radical initiator, is widely applied for the polymerization reaction of polymers in the chemical industries. When ADVN releases free radical during the decomposition process, it can accompany abundant heat and huge pressure to increase the possibility of thermal runaway and hazard, causing unacceptable thermal explosion or fire accidents. To develop an inherently safer process for ADVN, the thermal stability parameters of ADVN were obtained to investigate thermal decomposition characteristics using a DSC (differential scanning calorimetry) and TG (thermogravimetry). We used various kinetic models to completely depict the kinetic behavior and determine the thermal safety parameters for ADVN. The green thermal analysis approach could be used to substitute for complicated procedures and large-scale experiments of traditional thermal analysis methods, avoiding environmental pollution and energy depletion. 展开更多
关键词 ADVN (2 2'-Azobis (2 4-dimethyl) valeronitrile) green thermal analysis approach kinetic models thermal runaway and hazard thermal safety parameters.
下载PDF
Tsallis Mapping in Growing Complex Networks with Fitness 被引量:1
17
作者 苏桂锋 张小兵 张一 《Communications in Theoretical Physics》 SCIE CAS CSCD 2012年第3期493-498,共6页
We introduce Tsallis mapping in Bianconi-Barabgsi (B-B) fitness model of growing networks. This mapping addresses the dynamical behavior of the fitness model within the framework of nonextensive statistics mechanics... We introduce Tsallis mapping in Bianconi-Barabgsi (B-B) fitness model of growing networks. This mapping addresses the dynamical behavior of the fitness model within the framework of nonextensive statistics mechanics, which is characterized by a dimensionless nonextensivity parameter q. It is found that this new phenomenological parameter plays an important role in the evolution of networks: the underlying evolving networks may undergo a different phases depending on the q exponents, comparing to the original B-B fitness model, and the corresponding critical transition temperature Tc is also identified. 展开更多
关键词 growing complex network fitness model Tsallis statistics critical transition
原文传递
Degree Distribution Dynamics for Disease Spreading with Individual Awareness 被引量:4
18
作者 SHANG Yilun 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2015年第1期96-104,共9页
Behavioral responses triggered by the perceived risk of experiencing the disease represent a key ingredient in the spread of epidemics across human population.In this paper,two forms of individual awareness(i.e.,the r... Behavioral responses triggered by the perceived risk of experiencing the disease represent a key ingredient in the spread of epidemics across human population.In this paper,two forms of individual awareness(i.e.,the risk perception of an emerging epidemic) are addressed:Contact awareness that increases with individual contact number,and local awareness that increases with the fraction of infected contacts.By extending the probability generating functionology,the author shows that it is possible to track the evolution of the degree distributions among susceptible and infected individuals when the underlying network of contacts is represented by a semi-random configuration model.It is hopefully to shed some light on the dynamic aspects of networked epidemiological models. 展开更多
关键词 Behavioral response complex network EPIDEMIOLOGY generating function.
原文传递
Learning embeddings of a heterogeneous behavior network for potential behavior prediction 被引量:1
19
作者 Yue-yang WANG Wei-hao JIANG +1 位作者 Shi-liang PU Yue-ting ZHUANG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2020年第3期422-436,共15页
Potential behavior prediction involves understanding the latent human behavior of specific groups,and can assist organizations in making strategic decisions.Progress in information technology has made it possible to a... Potential behavior prediction involves understanding the latent human behavior of specific groups,and can assist organizations in making strategic decisions.Progress in information technology has made it possible to acquire more and more data about human behavior.In this paper,we examine behavior data obtained in realworld scenarios as an information network composed of two types of objects(humans and actions)associated with various attributes and three types of relationships(human-human,human-action,and action-action),which we call the heterogeneous behavior network(HBN).To exploit the abundance and heterogeneity of the HBN,we propose a novel network embedding method,human-action-attribute-aware heterogeneous network embedding(a4 HNE),which jointly considers structural proximity,attribute resemblance,and heterogeneity fusion.Experiments on two real-world datasets show that this approach outperforms other similar methods on various heterogeneous information network mining tasks for potential behavior prediction. 展开更多
关键词 Network embedding Representation learning Human behavior Social networks Heterogeneous information network ATTRIBUTE
原文传递
Finite-Time Generalized Outer Synchronization Between Two Different Complex Networks 被引量:4
20
作者 孙永征 李望 阮炯 《Communications in Theoretical Physics》 SCIE CAS CSCD 2012年第11期697-703,共7页
This paper investigates the finite-time generalized outer synchronization between two complex dynamical networks with different dynamical behaviors. The two networks can be undirected or directed, and they may also co... This paper investigates the finite-time generalized outer synchronization between two complex dynamical networks with different dynamical behaviors. The two networks can be undirected or directed, and they may also contain isolated nodes and clusters. By using suitable controllers, sufficient conditions for finite-time generalized outer synchronization are derived based on the finite-time stability theory. Finally, numerical examples are examined to illustrate the effectiveness of the analytical results. The effect of control parameters on the synchronization time is also numerically demonstrated. 展开更多
关键词 complex dynamical network finite-time synchronization
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部