-
43501.暗示收集
[信息传输、软件和信息技术服务业] [2013-11-04]
Garbage collection is widely used and has largely been a boon for programmer productivity. However, traditional garbage collection is approaching both practical and theoretical performance limits. In practice, the maximum heap size and heap structure of large applications are in uenced as much by garbage collector behavior as by resource availability.We include a discussion of the design trade-o s inherent in our approach, and lessons to be learned from our collectors. We close with a discussion of several design variants which we have not been able to explore in depth, but believe would be worthwhile to explore in future work.
关键词:释放提示;串行收集器;并行收集器;收集器算法;元数据
-
43502.2013年10月(下半月)通信行业要闻综述
[计算机、通信和其他电子设备制造业,信息传输、软件和信息技术服务业] [2013-11-04]
报告从政策监管、行业要闻、区域要闻、企业要闻几个方面对10月下半月通信行业要闻进行了综述。
关键词:通信;软件;移动互联网;移动电信;LTE;宽带;5G
-
43503.一个自动化理疗发生器
[信息传输、软件和信息技术服务业] [2013-11-04]
Natural user interfaces (NUI) are the new standard in human computer interaction; they involve communication based on human senses and include (among others) voice recognition, motion detection, and touch interaction.This paper focuses on the automatic generation of these exercises in the context of a Kinect based application. We make two contributions: First, an XML-based exercise de nition language that describes exercises as a sequence of distinct poses; second, a method to create exercise de nitions from user demonstrations.We make two contributions: First, an XML-based exercise de nition language that describes exercises as a sequence of distinct poses; second, a method to create exercise de nitions from user demonstrations.
关键词:自然用户界面;NUI;远程理疗;人机交互;XML
-
43504.基于独立网络环境可视化的串联网络安全系统的设计和实施
[信息传输、软件和信息技术服务业] [2013-11-03]
In this study a Linked Network Security system based on Virtualization (LNSV) is proposed to effectively perform data transmissions in a network separated environment under the aspects of management, operation, and cost. The LNSV proposed in this study represents an open architecture in accessing its system through network connectors for all users in individual networks and can be used as a general purposed system for storing all data to be transmitted. It is possible to prevent the access of unauthorized users because the stored data files include source IP/PORT, destination IP/PORT and Hash Values. Also, it can guarantee the security of communication through transmitting and receiving data using encryption/ decryption functions. Thus, the LNSV can provide safe connection services between separated networks.
关键词:电子信息;网络安全;系统;设计
-
43505.福克-普朗克方程:游戏和信息在网络安全方面的不确定性
[信息传输、软件和信息技术服务业] [2013-11-03]
We have significant accomplishments on uncertainty quantification in inverse problems for dynamical systems, generalized sensitivity and optimal design of experiments, elasticity and viscoelasticity modeling for buried target detection, and general inverse problem methodology for proliferating populations. Our efforts have continued on development of efficient accurate integration of Fokker Planck equations. Our objective is to analyze and optimize the dynamic behavior of nonlinear stochastic differential equations, especially the stochastic resonance effects based on the probability density function generated by the Fokker Planck equation. Our approach uses the backward characteristic method and the time-splitting integration of the Fokker Planck equation.
关键词:电子信息;网络安全;福克-普朗克方程;不确定性
-
43506.网络安全协议
[信息传输、软件和信息技术服务业] [2013-11-03]
A network can be considered as the physical resource for a communication system. This chapter introduces network security protocols. In Chapter 7, we introduced the basic mechanisms for establishing protected communications. In this chapter, we use these mechanisms to establish protected communications at a specific layer.As we said, a layer represents a communication protocol and is tasked with a specific function or a specific service. At each layer, a header conveys instructions on where to deliver the data and how to process it.
关键词:电子信息;网络安全;协议
-
43507.无线网络安全
[信息传输、软件和信息技术服务业] [2013-11-03]
Wireless communications use radio waves as media to transmit information. Wireless network is an important portion of a communication system. In this chapter, we discuss security solutions for wireless networks. It is quite common that the wireless network serves as an access network to connect a communication node to a wired network using a radio technology such as cellular technology and the technology specified in IEEE 802.11, where the wireless link is the first hop and/or the last hop in a communication path as illustrated in Figure 10.1.
关键词:电子信息;网络安全;无线
-
43508.Skaion网络安全数据集的统计分析
[信息传输、软件和信息技术服务业] [2013-11-03]
This thesis considers the best use of network traffic data to increase cyber security. This operational problem is one of great concern to network administrators and users generally. Our specific task was performed for the Network Security Division of the Army Research Laboratory, who requested we analyze a dataset of cyber-attacks masked in a background of representative network traffic (the 'Skaion' dataset). We find that substantial preprocessing must done before statistical methods can be applied to raw network data, that no single predictor is sufficient, and that the most effective statistical analysis is logistic regression. Our approach is novel in that we consider not only single predictor events, but also combinations of reports from multiple tools. While we consider a number of different statistical techniques, we find that the most satisfactory model is based on logistic regression. Finally, we conclude that while the Skaion dataset is valuable in terms of its new approach to network traffic emulation, the 1999 KDD Cup and DARPA-MIT datasets-despite their many shortcomings-are more clearly organized and accessible to academic study. Cyber security is a globally important problem and datasets like Skaion's must maximize opportunities for cross-disciplinary academic endeavors.
关键词:电子信息;网络安全;数据集;统计分析
-
43509.全球海事VSAT市场报告(2012-2016年)
[信息传输、软件和信息技术服务业] [2013-10-31]
VSATs are communication terminals that transmit and receive text, audio, and video data using satellite broadband internet services. A VSAT network comprises a main station or hub and other sites located at remote places, which communicate with the satellite. These networks provide wireless broadband connectivity in areas that are not covered by wireline networks. To transmit and receive data, VSAT systems and applications make use of geostationary satellites that are placed in the geostationary orbit over the equator at an altitude of 35,786 kilometers. The movement of satellites in the geostationary orbit is always relative to a fixed position on Earth; this provides uninterrupted connectivity between the satellite and its antennas located at various points on Earth. Maritime VSAT enables satellite broadband communication using the VSAT network for sea vessels, oil and gas ships, leisure liners, and fishing boats.
关键词:甚小天线地球站;终端通信;终端发送;卫星宽带;互联网服务
-
43510.通过对多媒体框架NGN服务覆盖提出媒体信号共享方案
[信息传输、软件和信息技术服务业] [2013-10-30]
The media sharing technique in the signal for multimedia communication is one of the necessary research issues to provide the quality-guaranteed services over IP-based NGN (Next Generation Network). This paper proposes noisy signal reduction method with considering packet loss for multi-user connected multimedia communication. In order to reduce noisy signal without packet distortion efficiently for applying to All-IP based convergence environment, we provide a shared signal reduction and recovery scheme which use an optimized Wiener filtering technique based on input-SNR estimation with adaptive both-side information utilization according to the average magnitude variation across the frames. Also, this paper presents the policy-based service overlay IPTV framework for user experiences in the Open IPTV. We suggest the EPG ought to be selectable in the Open IPTV framework for requirements. The framework is proposed with the basis of the ITU-T IPTV NGN framework with IMS (IP Multimedia Subsystem).
关键词:电子信息;NGN;多媒体框架;信号共享