期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
基于电子邮件网络的人类动力学 被引量:2
1
作者 郑紫元 汪小帆 《上海交通大学学报》 EI CAS CSCD 北大核心 2011年第2期195-201,共7页
研究了国内某高校电子邮件网络所反映的该高校人员收发电子邮件的行为规律.结果表明,已有的2种人类动力学模型——优先级队列模型和连贯非齐次泊松过程模型均不能较好地刻画该电子邮件网络的动力学行为.鉴于优先级队列模型对用户间统一... 研究了国内某高校电子邮件网络所反映的该高校人员收发电子邮件的行为规律.结果表明,已有的2种人类动力学模型——优先级队列模型和连贯非齐次泊松过程模型均不能较好地刻画该电子邮件网络的动力学行为.鉴于优先级队列模型对用户间统一行为模式的假设并不成立,连贯非齐次泊松过程也不能体现个体行为的无规则间断和动态演变特性,提出了基于时间序列聚类分析的分段连贯非齐次泊松过程模型,得到了较好的预测效果. 展开更多
关键词 电子邮件网络 幂律分布 连贯非齐次泊松过程 聚类分析
在线阅读 下载PDF
基于复杂网络的电子邮件网络搜索策略研究 被引量:3
2
作者 戴佳男 朱耀琴 《电子设计工程》 2015年第17期55-57,61,共4页
电子邮件网络作为社会网络的一种形态,能反映人们的社交关系,对其展开研究有重要的社会意义。首先基于复杂网络理论构建了邮件网络的拓扑模型,分析了邮件网络的拓扑特性,在此基础上提出了一种基于点权和边权(Weight of Node and Edge,W... 电子邮件网络作为社会网络的一种形态,能反映人们的社交关系,对其展开研究有重要的社会意义。首先基于复杂网络理论构建了邮件网络的拓扑模型,分析了邮件网络的拓扑特性,在此基础上提出了一种基于点权和边权(Weight of Node and Edge,WNE)的邮件网络搜索策略。最后通过实验验证了该策略在搜索代价上优于广度优先、随机游走和最大度搜索策略这三种现有搜索策略,验证了其合理性和有效性。 展开更多
关键词 电子邮件网络 复杂网络 搜索策略 权值
在线阅读 下载PDF
电子邮件其势汹汹 传统信函稳守阵地
3
《邮政研究》 1997年第4期43-43,共1页
电子邮件其势汹汹传统信函稳守阵地电子邮件借互联网络之便,向传统信函发起了巨大冲击。但传统信函也并非束手无策,它凭借许多固有的特点和优势,稳住了阵脚。若将互联网络电子邮件与普通的1类信函相比,你会发现,电子邮件速度快,... 电子邮件其势汹汹传统信函稳守阵地电子邮件借互联网络之便,向传统信函发起了巨大冲击。但传统信函也并非束手无策,它凭借许多固有的特点和优势,稳住了阵脚。若将互联网络电子邮件与普通的1类信函相比,你会发现,电子邮件速度快,而信函则更为可靠。这是电子邮件用户... 展开更多
关键词 电子邮件 其势汹汹 信函 通信市场 网络电子邮件 无法投递 国际邮政 “长期共存 邮件信息 纸质媒体
在线阅读 下载PDF
Research on the Synchronization of Modulation Hopping System:I Synchronization Scheme 被引量:2
4
作者 Tai Nengjian Wu Dewei +1 位作者 Wu Jie Li Ting 《China Communications》 SCIE CSCD 2009年第4期148-154,共7页
In order to achieve fast synchronization of the modulation hopping system, a synchronization scheme called short code to guide long code is adopted, and the initial synchronization hops and service hops are designed i... In order to achieve fast synchronization of the modulation hopping system, a synchronization scheme called short code to guide long code is adopted, and the initial synchronization hops and service hops are designed in detail.According to the system requirements for short code in the properties of time-varying, safety and balance, an algorithm to design wide-gap chaos short code based on TOD is proposed.Synchronization performance analysis shows that the algorithm has good performance, the initial synchronization time and the later entering network synchronization time are short, additionally, maximum synchronization time difference and synchronization maintaining time are long, all of which meet the needs of normal communications, and further verify the synchronization scheme feasible. 展开更多
关键词 secure communication modulation hopping SYNCHRONIZATION
在线阅读 下载PDF
The Performance Analysis of the THMLD-based Mobile Multicast Method
5
作者 Guan Jianfeng Zhou Huachun +1 位作者 Li Xin Zhang Hongke 《China Communications》 SCIE CSCD 2009年第4期127-135,共9页
Mobile multicast is important for the emerging applications such as mobile video or audio conference and mobile IPTV.Some mobile multicast schemes have been proposed in the past few years, but most of them study the r... Mobile multicast is important for the emerging applications such as mobile video or audio conference and mobile IPTV.Some mobile multicast schemes have been proposed in the past few years, but most of them study the reconstruc-tion of multicast delivery tree, and few consider the group membership management for mobile sub-scribers.In this paper, we propose a new mobile multicast method based on the Two-Hop Multicast Listener Discovery(THMLD) protocol which pro-vides the mobile multicast membership manage-ment function by forwarding the traditional MLD messages to its neighboring subnets.To evaluate its performance, we analyze the THMLD and set up the simulation platform to compare it with the several traditional mobile multicast methods.The results show that THMLD can reduce the multicast join time, and the THMLD-based mobile multicast method can reduce the multicast join delay at a cost of increasing additional multicast maintenance cost. 展开更多
关键词 mobile multicast MLD BT RS join delay COST
在线阅读 下载PDF
Precise Transformation of Feistel to SP Fuse into LFSR
6
作者 Luo Lan Qu Zehui Song Chaoming 《China Communications》 SCIE CSCD 2009年第4期168-171,共4页
For the published block cipher algorithm, two kinds of round functions have been researched.Block ciphers in network environments are taking more risks than ever before because of their initialization key's distri... For the published block cipher algorithm, two kinds of round functions have been researched.Block ciphers in network environments are taking more risks than ever before because of their initialization key's distribution in the internet.The security of block cipher algorithm is affected by linear bias and nonlinear bias which are restricted by confusion layer and diffusion layer.This article takes an approach on how block cipher's two round structures are initially transformed when they fuse into LFSR.The SP structure can be considered two F functions in one Feistel round function which combines both right and left of origin data transformation.Furthermore, the round number linear function and nonlinear function of Feistel and SP structure are compared.The merit of SP structure is that it can fuse in LFSR as a nonlinear filter without memory. 展开更多
关键词 block cipher algorithm precise transformation merit of SP structure fuse in LFSR
在线阅读 下载PDF
An Enhanced and Extensible Data Structure for Flow Export Engine
7
作者 Zhang Pei Huang Xiaohong +1 位作者 Jiang Xiaoxiao Ma Yan 《China Communications》 SCIE CSCD 2009年第4期121-126,共6页
Flow-based measurement is a popular method for various network monitoring usages.However, many flow exporting softwares have still low performance to collect all flows.In this paper, we propose a IPFIX-based flow expo... Flow-based measurement is a popular method for various network monitoring usages.However, many flow exporting softwares have still low performance to collect all flows.In this paper, we propose a IPFIX-based flow export engine with an enhanced and extensible data structure, called XFix, on the basis of a GPL tool,-nProbe.In the engine, we use an extensible two-dimensional hash table for flow aggregation, which is able to improve the performance of the metering process as well as support bidirectional flow.Experimental results have shown its efficiency in multi-thread processing activity. 展开更多
关键词 network monitoring flow exporting bidirectional flow two-dimensional hash table IPFIX
在线阅读 下载PDF
A Kind of Multi-party Non-repudiation Protocol with Consistent Evidence
8
作者 Liu Dongmei Qing Sihan 《China Communications》 SCIE CSCD 2009年第4期88-96,共9页
With development of electronic com- merce, non-repudiation protocol as the basal component of non-repudiation service has done more and more important functions. Comparing with lots of work on two-party non-repudiatio... With development of electronic com- merce, non-repudiation protocol as the basal component of non-repudiation service has done more and more important functions. Comparing with lots of work on two-party non-repudiation, there are less work on multi-party non-repudiation protocol. Multi-party protocol is more complex and facing more challenge of collusion attack. In this paper we give a kind of multi-party non-repudiation protocol based on off-line TTP with consistent evidence. Consistent evidence is a property that can not only simplify the process of disputation resolving, but also make the service more friendly to users, which means that whether or not TTP involves, evidences participants obtained are consistent. In the meanwhile we analyze the collusion attack that multi-party protocol facing, our protocol can prevent collusion attack. 展开更多
关键词 multi-party fair non-repudiation protocol consistent evidence collusion attack freehess FAIRNESS
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部