Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Guangxi University(Natural Science Edition)
1001-7445
2011 Issue S1
A distributed microblogging data collection platform
LI Long2;3;LI Zhi-tang1;2;3;TU Hao1;3;SHI Chun-yong2;3
..............page:324-328
Design and implementation of faculty homepage service based on IPv6 under linux
FA Ji-li;WU Wei-xin;WANG Xing-wei
..............page:174-178
Research and implementation of VPN system based on PPTP-SSH tunnel gateway
MENG Bo;WANG Dan-hua;WANG Xue;ZHANG Lei;CHEN Lei
..............page:127-130
E-mail service troubleshooting strategies on campus network
WANG Yi-chen1;2;LIN Yu-song1;2;WANG Zong-min1
..............page:116-121
A survey of resource scheduling for virtualized data center
SONG Wei-jia1;MA Hao1;XIAO Zhen2;ZHANG Xiao-jun1;ZHANG Bei1
..............page:329-334
A private-MIB based virtual machine monitoring framework of Vmware
ZHAO Ze-yu;LI Jun;LIU Bai-xiang;YAN Hua
..............page:318-323
Principle and implementation of a rapid detection method from mini network packets attacking
XIE Rui;LAI Xue-liang;JIN Yao-hui
..............page:131-136
Personalized service of the million books digital library based on IPv6
WANG Xiao-jun1;YANG Chun-ling2;LI Rui-feng1; ZHANG Yin1;WANG Yong-chao2
..............page:349-353
Network platform design and development for geospatial information service based on IPv6
LI Ming;ZHU Xin-yan;LI De-ren
..............page:343-348
The application of SSL VPN in campus network
GE Su-hui;WANG Min
..............page:155-160
Architecture of multi-dimension web application security based on OWASP and WASC
WU Zhen12;CUI Jian12;ZHOU Chang-ling 12;ZHANG Bei12;Ministry of Education;Beijing 100871;China)
..............page:148-154
Application of Kinect in the video conference system
HUANG Kang-quan;CHEN Bi-jin;ZHEN Bo;XU Zhi-qi
..............page:308-313
Design of web log analysis system based on Hadoop/Hive
LIU Yong-zeng;ZHANG Xiao-jing;LI Xian-yi
..............page:314-317
Investigating the role of microblog in breaking news reporting
DING Jin2;3;TU Hao1;3
..............page:335-338
Analysis of P2P IPTV system-BeeZone operated under next generation campus network
Xie Da1;2;Li Zhi-tang1;2;3;GUO Zheng-biao1;2;TU Hao2;3;LIU Shu-yu1;3
..............page:165-169
An intrusion detection system for IPv4-IPv6 transition technology based on CIDF frame
REN Hong-hui;LI Ying-zhuang;LI Xian-yi
..............page:190-194
HTTP-based TCP header comperssion method in 6LoWPAN network
MA Zhe;HUANG Xiao-hong;MA Yan
..............page:222-227
A solution for credible and controllable IP multicast
CHEN Wen-Bo;SHI Ke-Fu;LI Lin
..............page:195-200
Web security monitoring and alarm system based on page analysis
WANG Yu1;LIU Jun1;LI Yuan1;WANG Xing-wei2(1.Networking Center;Northeastern University;Shenyang 110004;China 2.CERNET Northeastern Networking Center;Northeastern University;Shenyang 110004;China
..............page:137-141
The batch web pages tamper-resistant system based on snapshot polling and text detection
RUAN Hong-wei1;2;LI Hua1;2;WANG Xiao-yu1;WU Cheng-yong1;2;PANG Bin1;2
..............page:142-147
The design and implementation of the IC Card System
LIU Li-min;TAN Yin
..............page:264-267
Scheme of IPv6 campus network source address validation based on SAVI and its implementation
PAN Ying;LIANG Jing-zhang;WANG Shi-hui
..............page:185-189
Design and implementation of measurement platform for P2P streaming media
WANG Hao-ran1;2;LI Run-zhi1;LIN Yu-song1;2;WANG Zong-min1
..............page:11-16,87
CRM4G App Engine:Application development and hosting platform based on CRM4G
TANG Li-xiang;XU Xiao-lin;WU Song;SHI Xuan-hua
..............page:206-209
Implementation of a secure DHCPv6 system with entity authentication
SU Zhi-yang1;MA Hao2;ZHANG Xiao-jun2;ZHANG Bei2
..............page:201-205,217
A network traffic evaluation method based on mean aggregate model
ZHAO Gen-zhu;Bateer;WANG Gang
..............page:27-30
A distributed and lightweight node scheduling algorithm for campus wireless sensor network
FANG Li1;JIANG Jie2;YE Zhao-hui1
..............page:218-221
A digital asset management(DAM) and sharing system for university laboratory
LI Tao1;CHEN Ying1;LI Zhi-sheng1;YANG Dao-quan2
..............page:282-288
Research and implementation of multi-uplink access based on IPv6/v4
BAI hai;SU ying-ru
..............page:252-255
Mail system’s self-registration based on campus E-card system
ZHAO Li-juan;HUANG Yan-bo;LIU Hai-tao
..............page:243-246
A strategic map-based strategy of university informatization development
ZHANG Qiang-zhong1;SUN Zhen-dan2;WU You3
..............page:256-263
Research on data quality management in digital campus
JIA Chun-yan;ZHAO Ya-ping;CHENG Yan-qi
..............page:272-275
Research of RADIUS in access convergence router
SHAN Kang-kang1;ZHANG Xing-ming2
..............page:65-68
Design and implementation of BBS system in CNGI college union platform
YANG Dao-quan;XU Yong;ZHANG Ling
..............page:276-281
Real-time network alarming system based on Cacti and Fetion
WANG Xin1;JIANG Tian-fa2
..............page:47-50
Characteristics selection of network traffic under machine learning classification
ZHANG Long-can;LIU Bin;LI Zhi-tang
..............page:6-10
Campus network client secure access based on PUPV technology
YUAN Hu-sheng1;SUN Tao1;ZHU Shi-jie2
..............page:17-22
Design and implementation of network management system based on credit
NI Chun-sheng1;JIN Bo2;HAO Hui1
..............page:1-5
An automatic monitoring system in campus fiber-optic network
HAO Hui;YAN Cheng;NI Chun-sheng
..............page:51-54
Schema design of DNS server performance test
GUO Ya-jie1;LI Hua1;2;AO Teng-he1;2;WU Cheng-yong1;2;XIA Xing-hang1
..............page:55-60
Automatic extraction of HTTP application feature string
WU Hao1;2;CHENG Guang1;2
..............page:61-64
Management scheme of Wuhan public bicycle based on IOT
WANG Wei-hu1;LIU Yan-shen2
..............page:299-301
Trustworthy monitoring system for secret data transmission based on USB interface
SU Zhi-xin;SHEN Yong-jun;HUANG Hong-wen
..............page:93-99
Online video platform
ZHANG Hai-bin;HUANG Bao-qing;JIANG Kai-da
..............page:293-298
An infrastructure for flow-level network-wide traffic measurement based on Netflow
GAO Lei;YANG Jia-hai;ZHANG Hui;LI Fu-liang;ZHANG Bin
..............page:78-82
Design and implementation of a behavior based algorithm to detect spam zombie client
DENG Guo-qiang2;3;LI Zhi-tang1;2;3;LI Dong1;3;LI Zhan-chun1;3
..............page:100-104
Detection of Fast-Flux botnet based on control capacity of agent
LIU Zi-mao2;3;LI Zhi-tang1;2;3;LI Zhan-chun1;3;LI Dong1;3;FANG Ping2;3
..............page:105-109
A hybrid intrusion detection model based on Snort rules and neural network
LIU Ming1;GAO Yu-zhuo2
..............page:110-115
An anomaly detection method of E-mail account based on client behaviors
LIU Shu-yu1;3;LI Zhi-tang1;2;3;TU Hao1;3;GUO Zheng-biao2;3;XIE Da2;3
..............page:83-87
Design and implementation of Android-based intelligent remote controller for the video conferencing terminal
YUAN Hua;YANG Ze-an;LI Zhen-ning;ZHANG Ling
..............page:234-237,251
Research and implementation of an campus network users simulation test system
ZHANG Yong;LI Zhi-tang;ZHANG Jie-hui
..............page:73-77
A method of malicious webpages behavior detection based on BHO technology
FENG Xue-ping;LI Zhi-tang;TU Hao;BAO Jin-xia(1.Network Center;Huazhong University of Science and Technology;Wuhan 430074;China; 2.College of Computer Science and Technology;Huazhong University of Science and Tech nology; Wuhan 430074;China; 3.National Engineering Laboratory for Next Generation Internet Access System;Wuhan 43007;China
..............page:122-126
The design and application exploration of active delivery center based on university information
CHEN Xiao-fei;KANG Xiao-jun;ZHU Xiao-ling
..............page:247-251
Monkey-King immune evolutionary algorithm
ZOU Yan-ling1;WU Qi-man2;LI Yu-qiang2;WANG Bing2
..............page:268-271
Survey and analysis on IPv6 transition technologies
LI Miao;YANG Jia-Hai;WANG Hui
..............page:210-217
Analysis of entropy sensitivity in anomalies detection
LIU Jun;CHENG Guang;Ministry of Education;Nanjing;211189)
..............page:161-164
Cross-federation inter-visit technologies infederated identity management
Lü Jie1;2;ZHANG Yang1;2;FAN Xue-song1;2;CHEN Ping1;2;ZHANG Bei1;2; WANG Wen-qing3;ZHANG Yue-xiang3; Ministry of Education;Beijing 100871;China 3 Management Center ofChina Academic Library and Information System;Beijing 100871;China)
..............page:88-92,126
Campus network IPv6 network management system design and implementation
TANG Xue-wen1;XIONG Zhong-yang1;WANG Bao2;LIU Ye-xin2
..............page:179-184
An adaptive Hash function for flow record aggregation in time granularity
CAI Shao-min;DING Wei;ZHANG Jun
..............page:31-36
Research and implementation of university news management system
CHEN Yu-qing1;SHI Dong-xiao2;XU Yong3
..............page:238-242
Research and application of IPv6 network monitoring system based on nagios
WANG Shi-hui;PAN Ying;LIANG Jing-zhang
..............page:170-173
A distributedsystem of log analysis based on Hadoop
CHEN Wen-bo;ZHANG Xiu-juan;LI Lin;TANG Jun
..............page:339-342
Study on standardization of the campus network operation
JIANG cai-ping;WANG ji-long
..............page:228-233
Design and implementation of QoS management system based on OpenFlow
LI Ying-zhuang;SUN Meng;LI Xian-yi;WANG Nan
..............page:42-46