The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Digital rights management is the primary means of supervision and management in the Internet to protect digital intellectual property. But the traditional digital rights management is still based on C / S structure which cannot play live online, online on-demand network applications by using P2P technology. This article combined the principle of the third generation of P2P network structure characteristics...
Information sharing is the base of enhancing management performance of supply chain, though it makes enterprise facing all kinds of risks, such as cost increasing, relation entangled and disclosing the secrets etc.. This article indicated that information sharing is limited in supply chain, and the investment on its establishment is boundary based on a game model. The author also indicated that enterprises...
In this paper, an SVM (Support Vector Machines)-based P2P (Peer-to-peer) traffic identification algorithm is presented. It could capture traffic information online, training-offline and categories online. The SVM algorithm uses double characteristics IP and IP-Port to identify P2P traffic by means of different traffic features separately. From results of experiments, we proved that choosing the appropriate...
Peer-to-peer technology has become an extremely popular Internet application technology. This technology opens enormous business opportunities to the Internet and also seriously interferes with the quality of the Internet service. The traditional single deep flow inspection or deep packet inspection detection systems have owns merits and demerits. This paper describes a new peer-to-peer traffic identification...
Three classic multi-string matching algorithms such as AC, Wu-Manber and SBOM are researched and implemented in P2P traffic identification system based on Deep Packet Inspection in this paper. In order to adapt to the DPI technology, the code and parameter of these matching algorithm be make suitable adjustment. Three algorithms are used in DPI scanning under the same testing environment and the pretreatment...
DPI identification technology is a main technique of P2P data stream identification technology; the advantages of it are higher accuracy and the ability of distinguishing accurately which type of P2P applications. But it is difficult to apply in highspeed networks due to its slow execution speed. To solve this problem, this paper suggests six sampling strategies: invariable random sampling, invariable...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.