期刊文献+
共找到92,761篇文章
< 1 2 250 >
每页显示 20 50 100
Service-Oriented Network Virtualization Architecture for Internet of Things 被引量:4
1
作者 Yongan Guo Hongbo Zhu Longxiang Yang 《China Communications》 SCIE CSCD 2016年第9期163-172,共10页
As a key technology to realize smart services of Internet of Things(Io T),network virtualization technology can support the network diversification and ubiquity,and improve the utilization rate of network resources.Th... As a key technology to realize smart services of Internet of Things(Io T),network virtualization technology can support the network diversification and ubiquity,and improve the utilization rate of network resources.This paper studies the service-oriented network virtualization architecture for Io T services.Firstly the semantic description method for Io T services is proposed,then the resource representation model and resource management model in the environment of network virtualization are presented.Based on the above models,the service-oriented virtual network architecture for Io T is established.Finally,a smart campus system is designed and deployed based on the service-oriented virtual network architecture.Moreover,the proposed architecture and models are verified in experiments. 展开更多
关键词 Internet of Things network virtualization virtual network resource management virtual network embedding
在线阅读 下载PDF
AI-Driven Occupational Structural Transformation and Service-Oriented Manufacturing
2
作者 Pan Shan Guo Kaiming 《China Economist》 2025年第4期56-79,共24页
Occupational structural transformation is a common pattern during the steady growth of GDP per capita in major economies worldwide.In recent years,there has been a decline in the employment share of goods occupation a... Occupational structural transformation is a common pattern during the steady growth of GDP per capita in major economies worldwide.In recent years,there has been a decline in the employment share of goods occupation and an increase in service occupation within the Chinese manufacturing industry,presenting a trend of occupational structural transformation and rapid development of service-oriented manufacturing.It is an important driving force and typical performance of the high-end,intelligent,and green development of the manufacturing industry.As a strategic general technology which leads the new round of technological revolution and industrial transformation,artificial intelligence(AI)has become a new fundamental force to accelerate the occupational structural transformation and service-oriented manufacturing development in China.Thus,this paper establishes a dynamic general equilibrium model with AI technology and occupational heterogeneity,showing the endogenous mechanism of occupational structural transformation.We find that when AI technology is biased towards goods occupation,and the elasticity of substitution between goods occupation and service occupation is less than 1,then AI will drive the transformation of occupational structure from goods to service within the manufacturing sector,increase the proportion of service-oriented manufacturing,improve labor productivity of manufacturing relative to service and stabilize the real output share of manufacturing.Promoting deeper integration of different occupations,intensifying R&D in AI technology and reducing labor mobility barriers between occupations can effectively accelerate the occupational structural transformation and industrial structural upgrading.We use theoretical analysis and numerical simulation method to show the theoretical mechanism by which AI affects occupational structural transformation and industrial structural transformation from a macroeconomic perspective,and put forward policy implications on how to promote the service-oriented manufacturing development and accelerate the construction of modern industrial system through AI innovation. 展开更多
关键词 Artificial intelligence occupational structural transformation service-oriented manufacturing industrial structural transformation
在线阅读 下载PDF
Virtually Baer模
3
作者 王永铎 陈玉华 《兰州理工大学学报》 北大核心 2025年第1期145-149,共5页
引入virtually Baer模的概念,举例说明virtually Baer模是Baer模的真推广,给出了在一定条件下virtually Baer模对直和项的封闭性,讨论了virtually Baer模与GSIP模、广义SSIP模之间的关系,由此给出了半单artinian环及右V-环新的刻画.
关键词 virtually Baer模 Baer模 GSIP模 半单artinian环 V-环
在线阅读 下载PDF
Shared and Service-oriented CNC Machining System for Intelligent Manufacturing Process 被引量:8
4
作者 LI Yao LIU Qiang +1 位作者 TONG Ronglei CUI Xiaohong 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2015年第6期1100-1108,共9页
To improve efficiency,reduce cost,ensure quality effectively,researchers on CNC machining have focused on virtual machine tool,cloud manufacturing,wireless manufacturing.However,low level of information shared among d... To improve efficiency,reduce cost,ensure quality effectively,researchers on CNC machining have focused on virtual machine tool,cloud manufacturing,wireless manufacturing.However,low level of information shared among different systems is a common disadvantage.In this paper,a machining database with data evaluation module is set up to ensure integrity and update.An online monitoring system based on internet of things and multi-sensors"feel"a variety of signal features to"percept"the state in CNC machining process.A high efficiency and green machining parameters optimization system"execute"service-oriented manufacturing,intelligent manufacturing and green manufacturing.The intelligent CNC machining system is applied in production.CNC machining database effectively shares and manages process data among different systems.The prediction accuracy of online monitoring system is up to 98.8%by acquiring acceleration and noise in real time.High efficiency and green machining parameters optimization system optimizes the original processing parameters,and the calculation indicates that optimized processing parameters not only improve production efficiency,but also reduce carbon emissions.The application proves that the shared and service-oriented CNC machining system is reliable and effective.This research presents a shared and service-oriented CNC machining system for intelligent manufacturing process. 展开更多
关键词 INTELLIGENT service-oriented SHARED DATABASE MONITOR OPTIMIZATION evaluation
在线阅读 下载PDF
Design and Implementation of Service-Oriented Spatial Information Sharing Framework in Digital City 被引量:6
5
作者 邵振峰 李德仁 《Geo-Spatial Information Science》 2009年第2期104-109,共6页
This paper proposes a theoretical framework of spatial information sharing in a digital city, and analyzes its technical characteristics. According to the service-oriented architecture (SOA) framework, a geospatial in... This paper proposes a theoretical framework of spatial information sharing in a digital city, and analyzes its technical characteristics. According to the service-oriented architecture (SOA) framework, a geospatial information sharing platform is put forward. The spatial information sharing model based on SOA is designed. A prototype platform realizing multiple-source spatial information sharing based on ArcGIS Server is developed. 展开更多
关键词 digital city Web services service-oriented architecture (SOA) spatial information sharing
原文传递
ApplianceBricks: A Scalable Network Appliance Architecture for Network Functions Virtualization 被引量:2
6
作者 MA Shicong WANG Baosheng +1 位作者 ZHANG Xiaozhe GAO Xianming 《China Communications》 SCIE CSCD 2016年第S1期32-42,共11页
Network Functions Virtualization(NFV) is an attempt to help operators more effectively manage their networks by implementing traditional network functions embedded in specialized hardware platforms in term of virtuali... Network Functions Virtualization(NFV) is an attempt to help operators more effectively manage their networks by implementing traditional network functions embedded in specialized hardware platforms in term of virtualized software instances. But, existing novel network appliances designed for NFV infrastructure are always architected on a general-purpose x86 server, which makes the performance of network functions limited by the hosted single server. To address this challenge, we propose ApplianceB ricks, a novel NFV-enable network appliance architecture that is used to explore the way of consolidating multiple physical network functions into a clustered network appliance, which is able to improve the processing capability of NFV-enabled network appliances. 展开更多
关键词 NFV network APPLIANCE virtualization software ROUTERS cluster-based appliances CONSOLIDATION SCALABILITY
在线阅读 下载PDF
A Trusted Mobile Payment Environment Based on Trusted Computing and Virtualization Technology 被引量:2
7
作者 WANG Juan LIN Wutao +3 位作者 LI Haoyu DU Bianxia MENG Ke WANG Jiang 《Wuhan University Journal of Natural Sciences》 CAS 2014年第5期379-384,共6页
In this paper, we propose a trusted mobile payment environment (TMPE) based on trusted computing and virtualization technology. There are a normal operating system (OS) and a trusted OS (TOS) in TMPE. We store t... In this paper, we propose a trusted mobile payment environment (TMPE) based on trusted computing and virtualization technology. There are a normal operating system (OS) and a trusted OS (TOS) in TMPE. We store the image of TOS in a memory card to hinder tampering. The integrity of TOS is protected by means of a trusted platform module (TPM). TOS can only be updated through a trusted third party. In addition, virtualization technology is applied to isolate TOS from normal OS. Users complete ordinary affairs in normal OS and security-sensitive affairs in TOS. TMPE can offer users a highly protected environment for mobile payment. Moreover, TMPE has good compatibility in different hardware architectures of mobile platforms. As the evaluation shows, TMPE satisfies the requirement of mobile payment well. 展开更多
关键词 trusted computing mobile payment virtualization mobile platform
原文传递
Service-oriented weapon systems of system portfolio selection method 被引量:3
8
作者 CHEN Ziyi DOU Yajie +1 位作者 XU Xiangqian TAN Yuejin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2020年第3期551-566,共16页
Weapon system portfolio selection is an important combinatorial problem that arises in various applications,such as weapons development planning and equipment procurement,which are of concern to military decision make... Weapon system portfolio selection is an important combinatorial problem that arises in various applications,such as weapons development planning and equipment procurement,which are of concern to military decision makers.However,the existing weapon system-of-systems(SoS)is tightly coupled.Because of the diversity and connectivity of mission requirements,it is difficult to describe the direct mapping relationship from the mission to the weapon system.In the latest service-oriented research,the introduction of service modules to build a service-oriented,flexible,and combinable structure is an important trend.This paper proposes a service-oriented weapon system portfolio selection method,by introducing service to serve as an intermediary to connect missions and system selection,and transferring the weapon system selection into the service portfolio selection.Specifically,the relation between the service and the task is described through the service-task mapping matrix;and the relation between the service and the weapon system is constructed through the servicesystem mapping matrix.The service collaboration network to calculate the flexibility and connectivity of each service portfolio is then established.Through multi-objective programming,the optimal service portfolios are generated,which are further decoded into weapon system portfolios. 展开更多
关键词 weapon system portfolio selection service-oriented multi-objective programming
在线阅读 下载PDF
Virtualization Technology in Cloud Computing Based Radio Access Networks:A Primer 被引量:2
9
作者 ZHANG Xian PENG Mugen 《ZTE Communications》 2017年第4期47-66,共20页
Since virtualization technology enables the abstraction and sharing of resources in a flexible management way, the overall expenses of network deployment can be significantly reduced. Therefore, the technology has bee... Since virtualization technology enables the abstraction and sharing of resources in a flexible management way, the overall expenses of network deployment can be significantly reduced. Therefore, the technology has been widely applied in the core network. With the tremendous growth in mobile traffic and services, it is natural to extend virtualization technology to the cloud computing based radio access networks(CCRANs) for achieving high spectral efficiency with low cost.In this paper, the virtualization technologies in CC-RANs are surveyed, including the system architecture, key enabling techniques, challenges, and open issues. The enabling key technologies for virtualization in CC-RANs mainly including virtual resource allocation, radio access network(RAN) slicing, mobility management, and social-awareness have been comprehensively surveyed to satisfy the isolation, customization and high-efficiency utilization of radio resources. The challenges and open issues mainly focus on virtualization levels for CC-RANs, signaling design for CC-RAN virtualization, performance analysis for CC-RAN virtualization, and network security for virtualized CC-RANs. 展开更多
关键词 network virtualization CC-RAN RAN SLICING FOG computing
在线阅读 下载PDF
6G service-oriented space-air-ground integrated network: A survey 被引量:14
10
作者 Nan CHENG Jingchao HE +5 位作者 Zhisheng YIN Conghao ZHOU Huaqing WU Feng LYU Haibo ZHOU Xuemin SHEN 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2022年第9期1-18,共18页
As an indispensable component of the emerging 6G networks,Space-Air-Ground Inte-grated Networks(SAGINs)are envisioned to provide ubiquitous network connectivity and services by integrating satellite networks,aerial ne... As an indispensable component of the emerging 6G networks,Space-Air-Ground Inte-grated Networks(SAGINs)are envisioned to provide ubiquitous network connectivity and services by integrating satellite networks,aerial networks,and terrestrial networks.In 6G SAGINs,a wide variety of network services with the features of diverse requirements,complex mobility,and multi-dimensional resources will pose great challenges to service provisioning,which urges the develop-ment of service-oriented SAGINs.In this paper,we conduct a comprehensive review of 6G SAGINs from a new perspective of service-oriented network.First,we present the requirements of service-oriented networks,and then propose a service-oriented SAGINs management architec-ture.Two categories of critical technologies are presented and discussed,i.e.,heterogeneous resource orchestration technologies and the cloud-edge synergy technologies,which facilitate the interoperability of different network segments and cooperatively orchestrate heterogeneous resources across different domains,according to the service features and requirements.In addition,the potential future research directions are also presented and discussed. 展开更多
关键词 Mobile Edge Computing(MEC) Network Function virtual-ization(NFV) Network slicing service-oriented network Software Defined Network-ing(SDN) Space-Air-Ground Inte-grated Networks(SAGINs)
原文传递
Security Challenges of Virtualization Hypervisors in Virtualized Hardware Environment 被引量:1
11
作者 Gabriel Cephas Obasuyi Arif Sari 《International Journal of Communications, Network and System Sciences》 2015年第7期260-273,共14页
The concept of virtualization machines is not new, but it is increasing vastly and gaining popularity in the IT world. Hypervisors are also popular for security as a means of isolation. The virtualization of informati... The concept of virtualization machines is not new, but it is increasing vastly and gaining popularity in the IT world. Hypervisors are also popular for security as a means of isolation. The virtualization of information technology infrastructure creates the enablement of IT resources to be shared and used on several other devices and applications;this increases the growth of business needs. The environment created by virtualization is not restricted to any configuration physically or execution. The resources of a computer are shared logically. Hypervisors help in virtualization of hardware that is a software interact with the physical system, enabling or providing virtualized hardware environment to support multiple running operating system simultaneously utilizing one physical server. This paper explores the benefits, types and security issues of Virtualization Hypervisor in virtualized hardware environment. 展开更多
关键词 virtualization Hypervisors virtual MACHINE virtual MACHINE MONITOR SECURITY
在线阅读 下载PDF
Network Virtualization Based Seamless Networking Scheme for Fiber-Wireless(FiWi)Networks 被引量:3
12
作者 DAI Qinglong ZOU Jianfeng +2 位作者 SHOU Guochu HU Yihong GUO Zhigang 《China Communications》 SCIE CSCD 2014年第5期1-16,共16页
In order to reduce cost and complexity,fiber-wireless(FiWi)networks emerge,combining the huge amount of available bandwidth of fiber networks and the flexibility,mobility of wireless networks.However,there is still a ... In order to reduce cost and complexity,fiber-wireless(FiWi)networks emerge,combining the huge amount of available bandwidth of fiber networks and the flexibility,mobility of wireless networks.However,there is still a long way to go before taking fiber and wireless systems as fully integrated networks.In this paper,we propose a network visualization based seamless networking scheme for FiWi networks,including hierarchical model,service model,service implementation and dynamic bandwidth assignment(DBA).Then,we evaluate the performance changes after network virtualization is introduced.Throughput for nodes,bandwidth for links and overheads leaded by network virtualization are analyzed.The performance of our proposed networking scheme is evaluated by simulation and real implementations,respectively.The results show that,compared to traditional networking scheme,our scheme has a better performance. 展开更多
关键词 fiber-wireless networks network virtualization SERVICE future network
在线阅读 下载PDF
Design of Service-Oriented Architecture for Spatial Data Integration and Its Application in Building Web-based GIS Systems 被引量:4
13
作者 SHA Zongyao XIE Yichun 《Geo-Spatial Information Science》 2010年第1期8-15,共8页
In this paper we propose a service-oriented architecture for spatial data integration (SOA-SDI) in the context of a large number of available spatial data sources that are physically sitting at different places, and d... In this paper we propose a service-oriented architecture for spatial data integration (SOA-SDI) in the context of a large number of available spatial data sources that are physically sitting at different places, and develop web-based GIS systems based on SOA-SDI, allowing client applications to pull in, analyze and present spatial data from those available spatial data sources. The proposed architecture logically includes 4 layers or components; they are layer of multiple data provider services, layer of data in-tegration, layer of backend services, and front-end graphical user interface (GUI) for spatial data presentation. On the basis of the 4-layered SOA-SDI framework, WebGIS applications can be quickly deployed, which proves that SOA-SDI has the potential to reduce the input of software development and shorten the development period. 展开更多
关键词 spatial data integration web-based GIS service-oriented architecture software
原文传递
Research on User Permission Isolation for Multi-Users Service-Oriented Program 被引量:1
14
作者 Li Yu Jiang Wei +4 位作者 Lin Li Zhan Jing Liang Peng Yingxu Lai Shupo Bu 《International Journal of Communications, Network and System Sciences》 2012年第2期105-110,共6页
For the super user privilege control problem in system services, a user permission isolation method is proposed. Based on virtualization technology, the permission limited environments are constructed for different us... For the super user privilege control problem in system services, a user permission isolation method is proposed. Based on virtualization technology, the permission limited environments are constructed for different users. According to privilege sets, the users, mapping relations are built among users, isolated domains and program modules. Besides, we give an algorithm for division of program permissions based on Concept Lattices. And the security strategies are designed for different isolated domains. Finally, we propose the implications of least privilege, and prove that the method eliminates the potential privileged users in system services. 展开更多
关键词 Least PRIVILEGE virtualization ISOLATION Privileged USER Domain System Service
暂未订购
Content Addressable Storage Optimization for Desktop Virtualization Based Disaster Backup Storage System 被引量:3
15
作者 Ruan Li Xiao Lim in Zhu Mingfa 《China Communications》 SCIE CSCD 2012年第7期1-13,共13页
This paper proposes a content addres sable storage optimization method, VDeskCAS, for desktop virtualization storage based disaster backup storage system. The method implements a blocklevel storage optimization, by em... This paper proposes a content addres sable storage optimization method, VDeskCAS, for desktop virtualization storage based disaster backup storage system. The method implements a blocklevel storage optimization, by employing the algorithms of chunking image file into blocks, the blockffmger calculation and the block dedup li cation. A File system in Use Space (FUSE) based storage process for VDeskCAS is also introduced which optimizes current direct storage to suit our content addressable storage. An interface level modification makes our system easy to extend. Experiments on virtual desktop image files and normal files verify the effectiveness of our method and above 60% storage volume decrease is a chieved for Red Hat Enterprise Linux image files. Key words: disaster backup; desktop virtualization; storage optimization; content addressable storage 展开更多
关键词 disaster backup desktop virtualization storage optimization content addressable storage
在线阅读 下载PDF
A highly reliable embedding algorithm for airborne tactical network virtualization 被引量:2
16
作者 MIAO Jingcheng LYU Na +2 位作者 CHEN Kefan CHEN Zhuo GAO Weiting 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2021年第6期1364-1374,共11页
The evolution of airborne tactical networks(ATNs)is impeded by the network ossification problem.As a solution,network virtualization(NV)can provide a flexible and scalable architecture where virtual network embedding(... The evolution of airborne tactical networks(ATNs)is impeded by the network ossification problem.As a solution,network virtualization(NV)can provide a flexible and scalable architecture where virtual network embedding(VNE)is a key part.However,existing VNE algorithms cannot be optimally adopted in the virtualization of ATN due to the complex interference in aircombat field.In this context,a highly reliable VNE algorithm based on the transmission rate for ATN virtualization(TR-ATVNE)is proposed to adapt well to the specific electromagnetic environment of ATN.Our algorithm coordinates node and link mapping.In the node mapping,transmission-rate resource is firstly defined to effectively evaluate the ranking value of substrate nodes under the interference of both environmental noises and enemy attacks.Meanwhile,a feasible splitting rule is proposed for path splitting in the link mapping,considering the interference between wireless links.Simulation results reveal that our algorithm is able to improve the acceptance ratio of virtual network requests while maintaining a high revenue-to-cost ratio under the complex electromagnetic interference. 展开更多
关键词 airborne tactical network(ATN) network virtualization(NV) resource allocation virtual network embedding(VNE) transmission rate
在线阅读 下载PDF
TPM Context Manager and Dynamic Configuration Management for Trusted Virtualization Platform 被引量:1
17
作者 QIN Yu FENG Dengguo LIU Chunyong 《Wuhan University Journal of Natural Sciences》 CAS 2008年第5期539-546,共8页
It is absolutely critical that trusted configuration management which significantly affects trust chain establishment, sealing storage and remote attestation, especially in trusted virtualization platform like Xen who... It is absolutely critical that trusted configuration management which significantly affects trust chain establishment, sealing storage and remote attestation, especially in trusted virtualization platform like Xen whose system configuration changes easily. TPM (trusted platform module) context manager is presented to carry out dynamic configuration management for virtual machine. It manages the TPM command requests and VM (virtual machine) configurations. The dynamic configuration representa- tion method based on Merkle hash tree is explicitly proposed against TCG (trusted computing group) static configuration representation. It reflects the true VM status in real time even if the configuration has changed, and it eliminates the invalidation of configuration representation, sealing storage and remote attestation. TPM context manager supports TCG storage protection, remote attestation etc, which greatly enhances the security on trusted virtualization platform. 展开更多
关键词 trusted computing TPM (trusted platform module) trusted virtualization configuration representation configuration management
在线阅读 下载PDF
A Service-Oriented Architecture of Cyber-Physical System and Study on Two Key Issues 被引量:1
18
作者 王鹏 向阳 张骐 《Journal of Donghua University(English Edition)》 EI CAS 2012年第4期299-304,共6页
As the basis of designing and implementing a cyber-physical system (CPS), architecture research is very important but still at preliminary stage. Since CPS includes physical components, time and space constraints seri... As the basis of designing and implementing a cyber-physical system (CPS), architecture research is very important but still at preliminary stage. Since CPS includes physical components, time and space constraints seriously challenge architecture study. In this paper, a service-oriented architecture of CPS was presented. Further, a two-way time synchronization algorithm for CPS service composition was put forward. And a formal method, for judging if actual CPS service meets space constraints, was suggested, which was based on space-π-calculus proposed. Finally, a case study was performed and CPS business process designed by the model and the proposed methods could run well. The application of research conclusion implies that it has rationality and feasibility. 展开更多
关键词 cyber-physical system (CPS) service-oriented ARCHITECTURE two-way time SYNCHRONIZATION space-π-calculus
在线阅读 下载PDF
Science Letters:Three-dimensional conceptual model for service-oriented simulation 被引量:1
19
作者 Wen-guang WANG Wei-ping WANG +1 位作者 Justyna ZANDER Yi-fan ZHU 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2009年第8期1075-1081,共7页
In this letter,we propose a novel three-dimensional conceptual model for an emerging service-oriented simulation paradigm. The model can be used as a guideline or an analytic means to find the potential and possible f... In this letter,we propose a novel three-dimensional conceptual model for an emerging service-oriented simulation paradigm. The model can be used as a guideline or an analytic means to find the potential and possible future directions of the current simulation frameworks. In particular, the model inspects the crossover between the disciplines of modeling and simulation, service-orientation,and software/systems engineering. Finally, two specific simulation frameworks are studied as examples. 展开更多
关键词 Conceptual model Modeling and simulation service-oriented architecture Systems engineering
原文传递
A Review in the Core Technologies of 5G: Device-to-Device Communication, Multi-Access Edge Computing and Network Function Virtualization 被引量:2
20
作者 Ruixuan Tu Ruxun Xiang +1 位作者 Yang Xu Yihan Mei 《International Journal of Communications, Network and System Sciences》 2019年第9期125-150,共26页
5G is a new generation of mobile networking that aims to achieve unparalleled speed and performance. To accomplish this, three technologies, Device-to-Device communication (D2D), multi-access edge computing (MEC) and ... 5G is a new generation of mobile networking that aims to achieve unparalleled speed and performance. To accomplish this, three technologies, Device-to-Device communication (D2D), multi-access edge computing (MEC) and network function virtualization (NFV) with ClickOS, have been a significant part of 5G, and this paper mainly discusses them. D2D enables direct communication between devices without the relay of base station. In 5G, a two-tier cellular network composed of traditional cellular network system and D2D is an efficient method for realizing high-speed communication. MEC unloads work from end devices and clouds platforms to widespread nodes, and connects the nodes together with outside devices and third-party providers, in order to diminish the overloading effect on any device caused by enormous applications and improve users’ quality of experience (QoE). There is also a NFV method in order to fulfill the 5G requirements. In this part, an optimized virtual machine for middle-boxes named ClickOS is introduced, and it is evaluated in several aspects. Some middle boxes are being implemented in the ClickOS and proved to have outstanding performances. 展开更多
关键词 5th Generation Network virtualization Device-To-Device COMMUNICATION Base STATION Direct COMMUNICATION INTERFERENCE Multi-Access EDGE COMPUTING Mobile EDGE COMPUTING
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部