期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Research on communication between different VPN instances in marine information communication network
1
作者 WANG Qi CAI Renhan HAN Zexin 《Marine Science Bulletin》 2025年第1期66-76,共11页
This paper focuses on the research of MPLS VPN technology in the ocean information communication network.Through the analysis of the current situation of the ocean information communication network,the architecture de... This paper focuses on the research of MPLS VPN technology in the ocean information communication network.Through the analysis of the current situation of the ocean information communication network,the architecture design of MPLS VPN technology in the ocean information communication network and the important role of RD value and RT value in the VPN instances,the matching strategies of import RT and export RT of different VPN instances are verified through experiments. 展开更多
关键词 marine information communication network network integration RT(Route-Target)value MPLS VPN RD(Route-Distinguisher)value
在线阅读 下载PDF
Analysis of Copyright Infringement in Deep Linking
2
作者 Huochenchen 《International Journal of Technology Management》 2017年第4期17-21,共5页
With the development of Intemet technology, various kinds of network link show up, from common links to deep links, from the web to mobile client. Many platforms named the deep links banner aggregation service emerged... With the development of Intemet technology, various kinds of network link show up, from common links to deep links, from the web to mobile client. Many platforms named the deep links banner aggregation service emerged gradually. The deep linking has brought convenience to the public and also caused a lot of copyright infringement problems. This paper expounds the identification of infringement of the deep linking information transmission on internet and the identification of infringement of the right of reproduction, furthermore analyzing three kinds of applicable standards to determine interact information transmission behavior. Finally, we should gradually get rid of the dependence on server standard applicable, auxiliary for the substantive alternative standard, and gradually complete the substantive alternative standard. 展开更多
关键词 deep linking Identification of infringement information network communication rights
在线阅读 下载PDF
Epidemic-Like Proximity-Based Traffic Offloading
3
作者 DONG Wenxiang CHEN Jie +1 位作者 YANG Ying ZHANG Wenyi 《China Communications》 SCIE CSCD 2015年第10期91-107,共17页
Cellular networks are overloaded due to the mobile traffic surge,and mobile social networks(MSNets) can be leveraged for traffic offloading.In this paper,we study the issue of choosing seed users for maximizing the mo... Cellular networks are overloaded due to the mobile traffic surge,and mobile social networks(MSNets) can be leveraged for traffic offloading.In this paper,we study the issue of choosing seed users for maximizing the mobile traffic offloaded from cellular networks.We introduce a gossip-style social cascade(GSC) model to model the epidemic-like information diffusion process in MSNets.For static-case and mobile-case networks,we establish an equivalent view and a temporal mapping of the information diffusion process,respectively.We further prove the submodularity in the information diffusion and propose a greedy algorithm to choose the seed users for traffic offloading,yielding a sub-optimal solution to the NP-hard traffic offloading maximization(TOM) problem.Experiments are carried out to study the offloading performance,illustrating that the greedy algorithm significantly outperforms the heuristic and random algorithms,and user mobility can help further reduce cellular load. 展开更多
关键词 cellular traffic offloading graph theory information diffusion mobile social networks proximity-based communication
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部