期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
虚拟机技术在计算机网络实验中的运用 被引量:1
1
作者 斯康 《科技资讯》 2008年第27期28-29,共2页
在计算机网络实验当中,最重要的是有一个合适的实验环境。用虚拟机软件能构架出小型网络环境,利用该网络环境,能实现ftp,samba,apache等网络实验,也可以实现有危险性的如病毒攻击等网络安全实验。
关键词 虚拟机 VMWARE 网络实验 计算机网络应用程序
下载PDF
基于ASP.NET的网上购物系统的设计与实现 被引量:6
2
作者 隋玉磊 张云鹏 《科学技术与工程》 2007年第18期4781-4785,4794,共6页
ASP.NET是当前Web应用开发中流行的技术,本文探讨和研究系统的开发原理。设计并实现基于ASP.NET平台的网上购物系统,同时详述了各个功能模块及所采用的关键技术,以及购物车实现的优化方案。
关键词 计算机技术 计算机网络 计算机网络应用程序 ASP.NET三层结构 购物车
下载PDF
Research of the Queue Management Algorithms Applicable to the Network Processor
3
作者 Huajun Liu 《通讯和计算机(中英文版)》 2005年第5期16-19,共4页
关键词 运算器 计算机网络应用程序 网络技术 换算方法
下载PDF
ESTIMATION METHOD OF AIRSPACE CONNECTIVITY PROBABILITY IN MILITARY AANET 被引量:2
4
作者 Luo Changyuan Song Yulong Pang Songchao 《Journal of Electronics(China)》 2013年第6期538-546,共9页
Connectivity is the premise and foundation of networking and routing.For the probabilistic flight path of military aircraft resulting in the difficulty of Aeronautical Ad hoc NETwork(AANET) research,an estimation meth... Connectivity is the premise and foundation of networking and routing.For the probabilistic flight path of military aircraft resulting in the difficulty of Aeronautical Ad hoc NETwork(AANET) research,an estimation method of connectivity probability is proposed.The method takes airspace as the research object,starts with actual flight characteristics,and applies conclusions of random waypoint mobility model.Building a connectivity model by establishing Airspace Unit Circle(AUC) from the perspective of circle-circle coverage,the method obtains a theory of airspace network connectivity.Experiment demonstrates its correctness.Finally,according to the actual condition simulation,relationship between the number of aircraft,communication radius,and the flight area under connectivity probabilities is achieved,results provide reference for creating a network that under certain aerial combat condition. 展开更多
关键词 Aeronautical ad hoc network (AANET) Military aviation Mobility model Con-nectivity Airspace Unit Circle (AUC)
下载PDF
Exploring Application Layer Protocol Relationships in SoftSwitch
5
作者 Zhu Xiaomin Liao Jianxin +1 位作者 Chen Junliang Li Tonghong 《China Communications》 SCIE CSCD 2009年第4期155-167,共13页
Relationships between application layer protocols in softswitch are explored in this paper.Two notions, i.e.protocol relationship and protocol grouping, are proposed, which are not clearly defined and even not paid mu... Relationships between application layer protocols in softswitch are explored in this paper.Two notions, i.e.protocol relationship and protocol grouping, are proposed, which are not clearly defined and even not paid much attention to before.On the basis of a well known protocol relationship named protocol conversion, three novel protocol relationships including protocol collaboration relationship, protocol cooperation relationship and protocol independent relationship are presented, so that protocol relationships are classified into four types.According to the functionality and purpose of each protocol, main protocols related to softswitch are divided into five groups.As to protocol conversion in softswitch, information flow trail(IFT) is utilized to facilitate problem solving.A decision rule for protocol conversion mode is proposed to guide how to choose between direct conversion and indirect conversion.A property of protocol relationships in softswitch is induced from all kinds of service scenarios of softswitch.This property summarizes protocol relationships within each protocol group or between two specific protocol groups.A merit of protocol grouping together with classification of protocol relationship is also presented.The effort of this paper pushes the protocol engineering to go ahead. 展开更多
关键词 protocol relationship protocol grouping SOFTSWITCH information flow trail
下载PDF
AN ADAPTIVE-WEIGHTED TWO-DIMENSIONAL DATA AGGREGATION ALGORITHM FOR CLUSTERED WIRELESS SENSOR NETWORKS
6
作者 Zhang Junhu Zhu Xiujuan Peng Hui 《Journal of Electronics(China)》 2013年第6期525-537,共13页
In this paper,an Adaptive-Weighted Time-Dimensional and Space-Dimensional(AWTDSD) data aggregation algorithm for a clustered sensor network is proposed for prolonging the lifetime of the network as well as improving t... In this paper,an Adaptive-Weighted Time-Dimensional and Space-Dimensional(AWTDSD) data aggregation algorithm for a clustered sensor network is proposed for prolonging the lifetime of the network as well as improving the accuracy of the data gathered in the network.AWTDSD contains three phases:(1) the time-dimensional aggregation phase for eliminating the data redundancy;(2) the adaptive-weighted aggregation phase for further aggregating the data as well as improving the accuracy of the aggregated data; and(3) the space-dimensional aggregation phase for reducing the size and the amount of the data transmission to the base station.AWTDSD utilizes the correlations between the sensed data for reducing the data transmission and increasing the data accuracy as well.Experimental result shows that AWTDSD can not only save almost a half of the total energy consumption but also greatly increase the accuracy of the data monitored by the sensors in the clustered network. 展开更多
关键词 Data aggregation Adaptive-weighted aggregation Clustered Wireless Sensor Networks(WSNs) Linear regression Data accuracy Energy consumption Lempel-Ziv-Welch (LZW)
下载PDF
AN IDENTITY-BASED KEY AGREEMENT SCHEME FOR LARGE SCALE SENSOR NETWORKS
7
作者 Yang Lijun Wu Meng Ding Chao 《Journal of Electronics(China)》 2013年第6期574-586,共13页
To solve the problems of high memory occupation, low connectivity and poor resiliency against node capture, which existing in the random key pre-distribution techniques while applying to the large scale Wireless Senso... To solve the problems of high memory occupation, low connectivity and poor resiliency against node capture, which existing in the random key pre-distribution techniques while applying to the large scale Wireless Sensor Networks (WSNs), an Identity-Based Key Agreement Scheme (IBKAS) is proposed based on identity-based encryption and Elliptic Curve Diffie-Hellman (ECDH). IBKAS can resist man-in-the-middle attacks and node-capture attacks through encrypting the key agreement parameters using identity-based encryption. Theoretical analysis indicates that comparing to the random key pre-distribution techniques, IBKAS achieves significant improvement in key connectivity, communication overhead, memory occupation, and security strength, and also enables efficient secure rekcying and network expansion. Furthermore, we implement IBKAS for TinyOS-2.1.2 based on the MICA2 motes, and the experiment results demonstrate that IBKAS is feasible for infrequent key distribution and rekeying for large scale sensor networks. 展开更多
关键词 Large scale Wireless Sensor Networks (WSNs) Network security Key agreement Iden-tity-based cryptography
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部