首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5篇
  免费   0篇
综合类   4篇
水路运输   1篇
  2003年   2篇
  2002年   2篇
  1997年   1篇
排序方式: 共有5条查询结果,搜索用时 875 毫秒
1
1.
造船CIMS及其面临的问题   总被引:2,自引:0,他引:2  
本文论述了造船CIMS的特点,提出了造船行业实现CIMS需要研究的关键技术及其实现的办法。  相似文献   
2.
A New Scheme of Integrating NAS with SAN   总被引:4,自引:0,他引:4  
This paper reviewed two types of network storage technique: NAS and SAN, After comparing and analyzing, it concluded that the ultimate realization of network storage will be in the eventual convergence of NAS and SAN architectures. Currently, all the integration methods are based on the architecture level. This paper present-ed a device-level integration scheme based on IXP1200 network processor. The device can be used as an NAS file server or an SAN‘s storage node. Furthermore, it can be used as a bridge to connect NAS and SAN, and then beshared by their clients.  相似文献   
3.
IntroductionCryptographic protocols are the protocols usedto establish secure communication over insecureopen networks by exploiting cryptography,andthey are thought to be simple because just severalmessages are included. However,it is a subtleproblem to guarantee the correctness of a crypto-graphic protocol[1] .In order to solve this problem,many researchers have worked on applying formalmethods to analyze cryptographic protocols,andthey are notperformed on the executable code,butrather on Do…  相似文献   
4.
FAST UPDATE ALGORITHM FOR TCAM-BASED ROUTING LOOKUPS   总被引:1,自引:0,他引:1  
Introduction   The higher bandwidth need requires fastercommunication links and faster network router.The central bottlenecks in router are link speeds,switching and routing lookups. Readily availablesolutions exist for the first two factors:for exam-ple,fiber- optic cables can provide faster links.Switching was well studied and the good solutionslike fast busses and crossbar switches were devel-oped[1,2 ] .Thus the major remaining bottleneck isfast routing lookups. Fast forwarding engines,…  相似文献   
5.
This paper proposed two modifications on IKE protocol with pre-shared key authentication. The first modification can improve its immunity against DDoS attack by authenticating the initiator before the responder generates the computation-intensive Diffie-Hellman public value. The second modification can improve its efficiency when the attack on messages occurs because it can detect the attack quickly by replacing the centralized authentication in origical IKE protocol with immediate authentication. In addition, the two modifications can be integrated into one protocol compactly.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号