期刊文献+
共找到203篇文章
< 1 2 11 >
每页显示 20 50 100
Magnetic Field Emulations of Small Inhibitor RNA: Effects on Implanted GL261 Tumors in C57BL/6 Immune Competent Mice
1
作者 Xavier A. Figueroa Gabriel Vogeli B. Michael Butters 《Open Journal of Biophysics》 2024年第4期339-354,共16页
EMulate Therapeutics has developed a system for emulating the effects of solvated molecules via their magnetic field recordings. Recordings of magnetic field emissions of select small inhibitor RNAs (siRNAs;murine tar... EMulate Therapeutics has developed a system for emulating the effects of solvated molecules via their magnetic field recordings. Recordings of magnetic field emissions of select small inhibitor RNAs (siRNAs;murine targeting CTLA-4 and murine targeting PD-1) were tested on C57Bl/6 mice implanted subcutaneously with the GL261 murine tumor cell line. A signal composed of concatenated recordings of siRNA molecules targeting the murine CTLA-4 and PD-1 receptors (labeled A2) was used in immune competent C57Bl/6 mice. The mice were flank implanted with the murine glioblastoma cell line GL261. Mice were exposed to the signal continuously (24 hours a day) until tumor volumes reached the designated volume limit. Tumors were excised and analyzed via PAGE/Western blot for the expression of CTLA-4, PD-1, Ki67, Caspase 3, CD4 and CD8. Terminal blood draws were used for CBCs. We report the down regulation of the checkpoint inhibitors CTLA-4 in the exposed mice. Significant tumor volume reduction was observed in mice exposed to the siRNA signal compared to control mice;no adverse events were recorded. Cell blood counts (CBC) and protein expression patterns were observed to correlate with the expected function of protein expression inhibition of the targets. 展开更多
关键词 Cytotoxic T-Lymphocyte Antigen 4 (CTLA-4) Programmed Cell Death Protein 1 (PD-1) Electromagnetic Field Emulation Cancer Tumor Murine Glioblastoma Multiforme (GBM)
下载PDF
Toward scalable docker-based emulations of blockchain networks for research and development
2
作者 Diego Pennino Maurizio Pizzonia 《Blockchain(Research and Applications)》 EI 2024年第3期168-183,共16页
Blockchain,like any other complex technology,needs a strong testing methodology to support its evolution in both research and development contexts.Setting up meaningful tests for permissionless blockchain technology i... Blockchain,like any other complex technology,needs a strong testing methodology to support its evolution in both research and development contexts.Setting up meaningful tests for permissionless blockchain technology is a notoriously complex task for several reasons:software is complex,a large number of nodes are involved,the network is non-ideal,etc.Developers usually adopt small virtual laboratories or costly real devnets based on real software.Researchers usually prefer simulations of a large number of nodes based on simplified models.In this paper,we aim to obtain the advantages of both approaches,i.e.,performing large,realistic,inexpensive,and flexible experiments,using real blockchain software within a virtual environment.To do that,we address the challenge of running large blockchain networks in a single physical machine,leveraging Linux and Docker.We analyze a number of problems that arise when large blockchain networks are emulated,and we provide technical solutions for all of them.Finally,we describe two experiences of emulating fairly large blockchain networks on a single machine:adopting both research-oriented and production-oriented software and involving more than 3000 containers. 展开更多
关键词 Blockchain Blockchain emulation SCALABILITY DOCKER Research and development experiments
原文传递
基于动态仿真的分拣机行李系统分析及优化
3
作者 陈斌 洪映松 +2 位作者 冯雨顺 李鸣 刘琳琳 《物流技术与应用》 2024年第6期135-141,共7页
本文描述了基于分拣机的行李自动分拣系统的典型处理流程,建立了Emulate3D仿真模型,动态模拟了行李系统关键点流量、系统内时间和早到行李量等主要数据指标,并通过对不同模拟运营场景的迭代仿真,提出一种寻求航班开放装载时长和早到行... 本文描述了基于分拣机的行李自动分拣系统的典型处理流程,建立了Emulate3D仿真模型,动态模拟了行李系统关键点流量、系统内时间和早到行李量等主要数据指标,并通过对不同模拟运营场景的迭代仿真,提出一种寻求航班开放装载时长和早到行李量之间的最佳平衡点的方法,为行李系统设计优化及运营提供思路和参考。 展开更多
关键词 行李处理系统 分拣机 仿真 Emulate3D 优化
下载PDF
Optical local area network emulations over Ethernet passive optical networks:A survey 被引量:1
4
作者 PENG YunFeng KUANG YuJun LONG KePing 《Science in China(Series F)》 2008年第8期1000-1009,共10页
As a promising solution to efficiently achieving fiber to the home (FTTH), Ethernet passive optical network (EPON) is currently improved to provide intercommunication among customers, together with normal traffic ... As a promising solution to efficiently achieving fiber to the home (FTTH), Ethernet passive optical network (EPON) is currently improved to provide intercommunication among customers, together with normal traffic delivery, via optical local area network emulation. It is a new research direction and expected to enhance the normal EPON performances. The purpose of this article is to review the state-of -the-art solutions to emulating optical local area networks (OLANs) over EPON. We discuss the major problems involved, e.g., network architecture, control mechanisms, and other potential enhancements. We also outline areas for future researches. 展开更多
关键词 Ethernet passive optical networks optical local area networks LAN emulation on EPON broadband access networks
原文传递
Detecting Vulnerability on IoT Device Firmware: A Survey 被引量:2
5
作者 Xiaotao Feng Xiaogang Zhu +3 位作者 Qing-Long Han Wei Zhou Sheng Wen Yang Xiang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第1期25-41,共17页
Internet of things (IoT) devices make up 30%of all network-connected endpoints,introducing vulnerabilities and novel attacks that make many companies as primary targets for cybercriminals.To address this increasing th... Internet of things (IoT) devices make up 30%of all network-connected endpoints,introducing vulnerabilities and novel attacks that make many companies as primary targets for cybercriminals.To address this increasing threat surface,every organization deploying IoT devices needs to consider security risks to ensure those devices are secure and trusted.Among all the solutions for security risks,firmware security analysis is essential to fix software bugs,patch vulnerabilities,or add new security features to protect users of those vulnerable devices.However,firmware security analysis has never been an easy job due to the diversity of the execution environment and the close source of firmware.These two distinct features complicate the operations to unpack firmware samples for detailed analysis.They also make it difficult to create visual environments to emulate the running of device firmware.Although researchers have developed many novel methods to overcome various challenges in the past decade,critical barriers impede firmware security analysis in practice.Therefore,this survey is motivated to systematically review and analyze the research challenges and their solutions,considering both breadth and depth.Specifically,based on the analysis perspectives,various methods that perform security analysis on IoT devices are introduced and classified into four categories.The challenges in each category are discussed in detail,and potential solutions are proposed subsequently.We then discuss the flaws of these solutions and provide future directions for this research field.This survey can be utilized by a broad range of readers,including software developers,cyber security researchers,and software security engineers,to better understand firmware security analysis. 展开更多
关键词 Firmware emulation internet of things(IoT)firmware network fuzzing security static analysis
下载PDF
On Dynamic Channel Emulation in Sector MPAC for Over-the-Air Testing of Beamformed Massive MIMO Devices 被引量:1
6
作者 Xiaochen Chen Heng Wang +2 位作者 Weimin Wang Zheng Liu Yuanan Liu 《China Communications》 SCIE CSCD 2023年第4期41-56,共16页
In this article,novel emulation strategies for the sectored multiple probe anechoic chamber(SMPAC)are proposed to enable the reliable evaluation of the massive multiple-input multiple-output(MIMO)device operating at b... In this article,novel emulation strategies for the sectored multiple probe anechoic chamber(SMPAC)are proposed to enable the reliable evaluation of the massive multiple-input multiple-output(MIMO)device operating at beamforming mode,which requires a realistic non-stationary channel environment.For the dynamic propagation emulation,an efficient closed-form probe weighting strategy minimizing the power angular spectrum(PAS)emulation errors is derived,substantially reducing the associated computational complexity.On the other hand,a novel probe selection algorithm is proposed to reproduce a more accurate fading environment.Various standard channel models and setup configurations are comprehensively simulated to validate the capacity of the proposed methods.The simulation results show that more competent active probes are selected with the proposed method compared to the conventional algorithms.Furthermore,the derived closedform probe weighting strategy offers identical accuracy to that obtained with complicated numerical optimization.Moreover,a realistic dynamic channel measured in an indoor environment is reconstructed with the developed methodologies,and 95.6%PAS similarity can be achieved with 6 active probes.The satisfactory results demonstrate that the proposed algorithms are suitable for arbitrary channel emulation. 展开更多
关键词 BEAMFORMING channel emulation massive MIMO device multiple probe anechoic chamber(MPAC) over-the-air testing
下载PDF
基于动态仿真的独立ICS小车行李系统设计 被引量:1
7
作者 杨永胜 金刚 +1 位作者 李鸣 刘琳琳 《物流技术与应用》 2023年第9期140-147,共8页
本文将动态仿真引入独立ICS小车行李系统的设计过程,通过仿真控制策略分析优化行李系统布局;通过建立基于Emulate3D的仿真模型,动态仿真独立ICS小车行李系统关键点流量、系统内时间、早到行李量以及不同状态托盘的实时分布等数据特性;... 本文将动态仿真引入独立ICS小车行李系统的设计过程,通过仿真控制策略分析优化行李系统布局;通过建立基于Emulate3D的仿真模型,动态仿真独立ICS小车行李系统关键点流量、系统内时间、早到行李量以及不同状态托盘的实时分布等数据特性;验证了行李系统设计的合理性;解决了静态计算分析难以处理的,诸如基于航班波次的行李系统性能评估及不同故障模式下行李系统保障能力评估等难题。 展开更多
关键词 行李处理系统(BHS) 独立ICS小车系统(ICS) 仿真 Emulate3D
下载PDF
Adaptive Emulation Framework for Multi-Architecture IoT Firmware Testing
8
作者 Jihyeon Yu Juhwan Kim +2 位作者 Youngwoo Lee Fayozbek Rustamov Joobeom Yun 《Computers, Materials & Continua》 SCIE EI 2023年第5期3291-3315,共25页
Internet of things(IoT)devices are being increasingly used in numerous areas.However,the low priority on security and various IoT types have made these devices vulnerable to attacks.To prevent this,recent studies have... Internet of things(IoT)devices are being increasingly used in numerous areas.However,the low priority on security and various IoT types have made these devices vulnerable to attacks.To prevent this,recent studies have analyzed firmware in an emulation environment that does not require actual devices and is efficient for repeated experiments.However,these studies focused only on major firmware architectures and rarely considered exotic firmware.In addition,because of the diversity of firmware,the emulation success rate is not high in terms of large-scale analyses.In this study,we propose the adaptive emulation framework for multi-architecture(AEMA).In the field of automated emulation frameworks for IoT firmware testing,AEMA considers the following issues:(1)limited compatibility for exotic firmware architectures,(2)emulation instability when configuring an automated environment,and(3)shallow testing range resulting from structured inputs.To tackle these problems,AEMAcan emulate not onlymajor firmware architectures but also exotic firmware architectures not previously considered,such as Xtensa,ColdFire,and reduced instruction set computer(RISC)version five,by implementing a minority emulator.Moreover,we applied the emulation arbitration technique and input keyword extraction technique for emulation stability and efficient test case generation.We compared AEMA with other existing frameworks in terms of emulation success rates and fuzz testing.As a result,AEMA succeeded in emulating 864 out of 1,083 overall experimental firmware and detected vulnerabilities at least twice as fast as the experimental group.Furthermore,AEMAfound a 0-day vulnerability in realworld IoT devices within 24 h. 展开更多
关键词 Internet of things(IoT) emulation framework FIRMWARE FUZZING concolic execution VULNERABILITY
下载PDF
Performance Evaluation of Topologies for Multi-Domain Software-Defined Networking
9
作者 Jiangyuan Yao Weiping Yang +5 位作者 Shuhua Weng Minrui Wang Zheng Jiang Deshun Li Yahui Li Xingcan Cao 《Computer Systems Science & Engineering》 SCIE EI 2023年第10期741-755,共15页
Software-defined networking(SDN)is widely used in multiple types of data center networks,and these distributed data center networks can be integrated into a multi-domain SDN by utilizing multiple controllers.However,t... Software-defined networking(SDN)is widely used in multiple types of data center networks,and these distributed data center networks can be integrated into a multi-domain SDN by utilizing multiple controllers.However,the network topology of each control domain of SDN will affect the performance of the multidomain network,so performance evaluation is required before the deployment of the multi-domain SDN.Besides,there is a high cost to build real multi-domain SDN networks with different topologies,so it is necessary to use simulation testing methods to evaluate the topological performance of the multi-domain SDN network.As there is a lack of existing methods to construct a multi-domain SDN simulation network for the tool to evaluate the topological performance automatically,this paper proposes an automated multi-domain SDN topology performance evaluation framework,which supports multiple types of SDN network topologies in cooperating to construct a multi-domain SDN network.The framework integrates existing single-domain SDN simulation tools with network performance testing tools to realize automated performance evaluation of multidomain SDN network topologies.We designed and implemented a Mininet-based simulation tool that can connect multiple controllers and run user-specified topologies in multiple SDN control domains to build and test multi-domain SDN networks faster.Then,we used the tool to perform performance tests on various data center network topologies in single-domain and multi-domain SDN simulation environments.Test results show that Space Shuffle has the most stable performance in a single-domain environment,and Fat-tree has the best performance in a multi-domain environment.Also,this tool has the characteristics of simplicity and stability,which can meet the needs of multi-domain SDN topology performance evaluation. 展开更多
关键词 Software-defined networking emulation network multi-domain SDN data center network topology
下载PDF
Simulation of microstructures in solidification of aluminum twin-roll casting 被引量:11
10
作者 陈守东 陈敬超 《Transactions of Nonferrous Metals Society of China》 SCIE EI CAS CSCD 2012年第6期1452-1456,共5页
Based on the research on the solidification of twin-roll continuous casting aluminum thin strip, the analytical model of heterogeneous nucleation, the growth kinetics of tip (KGT) and columnar dendrite transformatio... Based on the research on the solidification of twin-roll continuous casting aluminum thin strip, the analytical model of heterogeneous nucleation, the growth kinetics of tip (KGT) and columnar dendrite transformation to equiaxed dendrite (CET) of twin-roll continuous casting aluminum thin strip solidification was established by means of the principle of metal solidification and modem computer emulational technology. Meantime, based on the cellular automaton, the emulational model of twin-roll continuous casting aluminum thin strip, solidification was established. The foundation for the emulational simulation of twin-roll casting thin strip solidification structure was laid. Meanwhile, the mathematical simulation feasibility was confirmed by using the solidification process of twin-roll continuous casting aluminum thin strip. 展开更多
关键词 twin-roll continuous casting solidification structure emulational simulation micro-model
下载PDF
eMule系统的协议分析 被引量:4
11
作者 俞燕燕 李绍滋 《合肥工业大学学报(自然科学版)》 CAS CSCD 北大核心 2006年第9期1096-1100,共5页
eMule是建立在点对点(peer to peer)技术上,以eDonkey协议为基础的文件共享软件。eMule的集中程度是混合性的,并非是完全无中心服务器。文章从协议的角度论述了eMule是如何实现文件共享,分析了客户端到服务器端、客户端到客户端之间的TC... eMule是建立在点对点(peer to peer)技术上,以eDonkey协议为基础的文件共享软件。eMule的集中程度是混合性的,并非是完全无中心服务器。文章从协议的角度论述了eMule是如何实现文件共享,分析了客户端到服务器端、客户端到客户端之间的TCP通讯、UDP通讯的原理及相关的信息序列图。 展开更多
关键词 EMULE 文件搜索 回调 握手
下载PDF
eMule协议的安全性研究 被引量:2
12
作者 刘简达 施勇 薛质 《计算机工程》 CAS CSCD 北大核心 2009年第13期134-136,共3页
研究eMule协议在安全性设计方面所存在的缺陷和不足,指出eMule软件在用户隐私泄露、用户积分欺诈和恶意代码攻击3个方面对用户造成的风险,给出改进方案。针对eMule协议在Ed2k链接格式上的2个漏洞提出一种新的攻击方式,设计攻击流程,并... 研究eMule协议在安全性设计方面所存在的缺陷和不足,指出eMule软件在用户隐私泄露、用户积分欺诈和恶意代码攻击3个方面对用户造成的风险,给出改进方案。针对eMule协议在Ed2k链接格式上的2个漏洞提出一种新的攻击方式,设计攻击流程,并进行模拟攻击实验,实验结果表明该攻击方式的成功率达到100%。 展开更多
关键词 安全保密 eMule协议 网络攻击 P2P技术
下载PDF
基于P2P思想改进Emule技术实现视频点播的技术研究 被引量:3
13
作者 蒋雪玲 鲁宏伟 潘颖 《软件导刊》 2006年第7期27-29,共3页
分析了使用Emule实现视频点播系统的可行性。提出了在利用原有的Emule技术基础上,通过改进几个适合VOD系统的方法,尤其对关键的片段选择法进行了详细阐述,使流媒体文件未下载完就可以播放,设计上不改动Emule协议,可以兼容现有的Emule环... 分析了使用Emule实现视频点播系统的可行性。提出了在利用原有的Emule技术基础上,通过改进几个适合VOD系统的方法,尤其对关键的片段选择法进行了详细阐述,使流媒体文件未下载完就可以播放,设计上不改动Emule协议,可以兼容现有的Emule环境,从而以较小的代价实现视频点播功能。 展开更多
关键词 流媒体 视频点播 对等网络 EMULE 片断选择
下载PDF
eMule网络最佳节点标识
14
作者 刘祥涛 程学旗 +3 位作者 李洋 陈小军 白硕 刘悦 《软件学报》 EI CSCD 北大核心 2011年第9期2121-2136,共16页
eMule网络是近年来越来越流行的文件共享对等网络.一直以来,文件源的准确定位是文件共享对等网络的一个关键步骤;此外,不健康内容的肆意传播也使网络监管成为必需.这些都导致准确确定eMule网络中节点的需求,同时促使eMule网络最佳节点... eMule网络是近年来越来越流行的文件共享对等网络.一直以来,文件源的准确定位是文件共享对等网络的一个关键步骤;此外,不健康内容的肆意传播也使网络监管成为必需.这些都导致准确确定eMule网络中节点的需求,同时促使eMule网络最佳节点标识问题的提出.然而,eMule网络中广泛使用的节点标识Kad ID因可被eMule用户任意更改,存在Kad ID别名,即单个节点对应多个Kad ID的情况,以及Kad ID重复,即多个节点对应同一个Kad ID的情况,从而使用传统Kad ID很难准确确定节点.为解决这一问题,首先定义候选节点标识的稳定因子用以评价候选标识;然后设计并实现一个证明可收敛且时空复杂度不高的eMule网络节点信息采集器——Rainbow,以获得实际eMule网络中节点的多个候选标识之间的对应关系信息.实验结果表明,{userID}的稳定因子最大,是节点标识集合2{Kad ID,userID,IP}?{Φ}中的最佳节点标识;之后,为了量化Kad ID别名问题的程度,对{userID}与{Kad ID}的关系进行探讨;最后对最佳节点标识的应用有效性进行分析,说明采用{userID}作为节点标识能够更准确地确定节点.总之,所确定的最佳节点标识为eMule网络的研究奠定了基础,Rainbow也为真实eMule网络测量提供了良好的工具. 展开更多
关键词 对等网络 eMule网络 采集器 节点标识 稳定因子
下载PDF
基于Emulate的锅炉负荷协调控制系统仿真实训
15
作者 姜萍 王丽颖 +1 位作者 田静 张耀鹏 《实验技术与管理》 CAS 北大核心 2016年第6期108-111,共4页
基于罗克韦尔RSLogix5000软件和RSLogix Emulate5000仿真控制器,实现了锅炉负荷协调控制系统组态,利用RSView32开发了监控界面,利用RSLinx软件实现了各部分的数据通信,完成了锅炉协调控制系统的仿真实训项目开发。通过实训项目开发流程... 基于罗克韦尔RSLogix5000软件和RSLogix Emulate5000仿真控制器,实现了锅炉负荷协调控制系统组态,利用RSView32开发了监控界面,利用RSLinx软件实现了各部分的数据通信,完成了锅炉协调控制系统的仿真实训项目开发。通过实训项目开发流程,按照整体架构、控制系统设计与仿真和监控界面三大任务,培养高校工科学生的工程意识、工程素质和工程实践能力。 展开更多
关键词 锅炉负荷 协调控制 仿真实训 Emulate仿真控制器
下载PDF
基于UART Emulation技术的MVB网卡设计与组网研究
16
作者 王峰超 刘泰 赵冬玉 《机车电传动》 北大核心 2015年第1期43-46,50,共5页
提出一种MVB网卡设计方案,在主机与MVB控制器的架构上结合UART Emulation技术,较为完善地实现了MVB设备的过程数据、消息数据、用户编程等功能。利用所设计的网卡与其他MVB网络设备进行MVB组网研究,依据单调比率算法进行周期扫描表的设... 提出一种MVB网卡设计方案,在主机与MVB控制器的架构上结合UART Emulation技术,较为完善地实现了MVB设备的过程数据、消息数据、用户编程等功能。利用所设计的网卡与其他MVB网络设备进行MVB组网研究,依据单调比率算法进行周期扫描表的设计,在所搭建的网络平台上进行基本的通信测试,验证了设计的正确性和可行性。该网卡尺寸符合标准3U大小,便于与其他网络设备集成于工控机箱之中。 展开更多
关键词 MVB 网卡设计 UART EMULATION 单调比率算法 通信测试
原文传递
Reliability emulation of production system on longwall face
17
作者 HAO Bing-yuan SUI Gang KANG Li-xun 《Journal of Coal Science & Engineering(China)》 2009年第1期76-80,共5页
Based on the theory of random process and the characteristic of the functioning of a system component subject to a certain specific probability distribution, emulated the whole process of system production on Iongwall... Based on the theory of random process and the characteristic of the functioning of a system component subject to a certain specific probability distribution, emulated the whole process of system production on Iongwall face was emulated, in which the methods of time pace and computer random emulation were adopted. The paper provides an objective basis for the analysis of a mining Iongwall face and the varied lines of effectiveness, machine stoppage rate and coal flow of components and system, and output etc.lt also offers some theories to improve productivity by discussing the application of the transformation plan and optimization of reasonable coal stock capacity, as well as selection of system equipment and matching optimization. 展开更多
关键词 fully-mechanized Iongwall face component reliability random emulations dynamic simulation
下载PDF
巧用eMule实现大文件传输
18
作者 尹大伟 李见伟 《网络与信息》 2009年第3期54-54,共1页
共享数据资源可以促进人们相互交流,达到充分利用信息资源的目的。Internet上提供了许多文件传输的方法,但大多都有一些缺点:只能传输小型文件;文件传输过程不够稳定,可靠性不高;传输速度慢;设置过程复杂等等。本文主要针对以上问题,结... 共享数据资源可以促进人们相互交流,达到充分利用信息资源的目的。Internet上提供了许多文件传输的方法,但大多都有一些缺点:只能传输小型文件;文件传输过程不够稳定,可靠性不高;传输速度慢;设置过程复杂等等。本文主要针对以上问题,结合eMule客户端的特点,介绍了使用eMule软件实现大文件传输的方法。 展开更多
关键词 文件传输 EMULE 共享数据资源 信息资源
下载PDF
SoC软硬件协同验证技术的应用研究 被引量:5
19
作者 方应龙 赵勇 幸强 《电子技术应用》 北大核心 2006年第12期44-46,共3页
介绍了软硬件协同验证的原理,给出了笔者在实际SoC开发中采用的四种软硬件协同验证方案。根据软硬件协同仿真原理提出CFM方案。对几种方案进行比较,并提出在实际SoC设计中选取软硬件协同验证方案的建议。
关键词 软硬件协同验证 ISS方案 CVE方案 CFM方案 FPGA/EMULATOR方案
下载PDF
eMule系统中的非均匀性分布 被引量:3
20
作者 蒋君 邓倩妮 《微电子学与计算机》 CSCD 北大核心 2007年第10期153-156,共4页
eMule是一款流行的P2P软件,它拥有大量的用户。通过eMule中的KAD覆盖网络开发了一个爬虫,抓取了eMule系统中的节点信息。发现eMule系统中资源分布得非常不均匀,如节点所处的地区分布不均匀,IP分布不均匀,文件的副本数分布不均匀,用户共... eMule是一款流行的P2P软件,它拥有大量的用户。通过eMule中的KAD覆盖网络开发了一个爬虫,抓取了eMule系统中的节点信息。发现eMule系统中资源分布得非常不均匀,如节点所处的地区分布不均匀,IP分布不均匀,文件的副本数分布不均匀,用户共享的文件数分布也不均匀。文件的副本数分布和用户共享的文件数分布基本符合Zipf分布,但是这两个分布并不完全符合Zipf,有着自己独特的特性。 展开更多
关键词 EMULE KAD 抓取 非均匀 ZIPF
下载PDF
上一页 1 2 11 下一页 到第
使用帮助 返回顶部