首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   38篇
  免费   0篇
  国内免费   2篇
教育   23篇
科学研究   8篇
综合类   4篇
信息传播   5篇
  2020年   3篇
  2019年   1篇
  2017年   1篇
  2016年   2篇
  2015年   3篇
  2013年   2篇
  2012年   3篇
  2011年   2篇
  2009年   1篇
  2008年   2篇
  2007年   8篇
  2006年   5篇
  2005年   4篇
  2004年   1篇
  2003年   1篇
  2001年   1篇
排序方式: 共有40条查询结果,搜索用时 31 毫秒
11.
P2P网络的认证方法研究(英文)   总被引:1,自引:0,他引:1  
P2P网络离散、动态和自治的特点使得传统的认证方法不能很好的解决其认证问题。本文采用证书和信任值相结合的方式,提出了一个新的认证协议APExSPKI用于解决P2P网络中节点之间的互认证问题。信任值绑定在证书中使得节点在身份认证的同时还可以进行授权和访问控制操作。 此外APExSPKI不需要可信服务器的参与,它允许网络中的任何节点参与到认证的过程中来,参与信任值投票并可充当代理节点来为其他节点颁发证书,这充分体现了节点对等、自治的特点。  相似文献   
12.
The heated rhetoric surroundingdigital copyright in general, and peer-to-peerfile sharing in particular, has inspired greatconfusion about what the copyright law does anddoes not prohibit. Most of the key legalquestions are still unsettled, in part becausecopyright defendants have run out of money andgone out of business before their cases couldgo to trial. In that vacuum, some copyrightowners are claiming that their preferred rulesof conduct are well-established legalrequirements. But those claims are strategic;those rules have never been endorsed by thecourts. They are made-up rules. There's adifference between our obligation to followreal rules, and our obligation to followmade-up ones. There may be an ethicalobligation to follow real rules, even when theyseem unreasonable. But we don't have anyethical obligation to follow made-up ones. Indeed, in this context, we may have an ethicalobligation to resist them. Some copyrightowners believe the law ought to enable them tocontrol essentially all significant uses oftheir works. The law has never said that, butit gets closer and closer every day. If webehave as though the made-up rules wereactually the law, we will make that day comemuch sooner.  相似文献   
13.
This paper illustrates the overlap of computer ethics and business ethics by examining two issues. The first is the lack of fit between digitalized information and copyright protection. Although there are moral arguments that can be used to justify protection of intellectual property, including computer software and digitalized data, the way that copyright protection has developed often reflects vested interests rather than the considered weighing of moral considerations. As a result, with respect to downloading MP3s, among other material, what is ethical is largely determined by the appropriately passed laws in each jurisdiction, and what is ethically permissible in one jurisdiction may be ethically impermissible in another. The second issue is the outsourcing of IT jobs from the U.S. While the practice has been politicized, examining it from an all-things-considered perspective, this paper argues it is ethically justified.I wrote this while I was a Resident at the Rockefeller Foundation Bellagio Study and Conference Center and I am pleased to acknowledge the support of the Foundation. I gave an abridged version of this paper at the Third World Congress of Business, Economics and Ethics in Melbourne, Australia, in July, 2004.  相似文献   
14.
从Internet的发展过程的角度阐述了对等计算的潜在优点及研究状况。  相似文献   
15.
介绍一种利用Ghostsrv软件。配合使用网卡驱动、枇处理文件等软件.在局域网内实现枇量克隆的方法。该方法对在局域网内快速进行系统的安装和维护很有利用价值。  相似文献   
16.
为了更好地适应对Intemet中迅速发展的新形态P2P网络应用进行建模的需求,深入研究了适于描述多方并发网络交互的形式化建模方法.首先,对P2P网络系统模型的各项特征及其分类进行了探讨.然后,参照构件化建模的研究思路,基于对P2P应用建模需求的分析,提出了一种运用通信顺序进程(CSP)进行描述的P2P网络应用的形式化描述方法.借助CSP进程组表示,该方法能够更为方便精确地描述P2P系统中以多方交互为主的动态交互关系,探讨了CSP非确定性语义在P2P交互建模中的应用.最后通过一个新型P2P媒体点播系统的实例展示了以上描述方法的应用,验证了该方法在描述并行交互关系等方面的能力.  相似文献   
17.
分析了使用Emule实现视频点播系统的可行性。提出了在利用原有的Emule技术基础上,通过改进几个适合VOD系统的方法,尤其对关键的片段选择法进行了详细阐述,使流媒体文件未下载完就可以播放,设计上不改动Emule协议,可以兼容现有的Emule环境,从而以较小的代价实现视频点播功能。  相似文献   
18.
In this paper, we incorporated peer-to-peer (P2P) concept with agent technology and put forward a collaborative work model based on peer-to-peer network (P2PCWM) after investigating into business demands of modern enterprises and problems prevailing in mainstream collaborative work systems based on central server. Theoretically, the P2PCWM can effectively overcome the problems in a conventional system with a central server and meet the practical demands of modern businesses. It is distinguished from other systems by its features of equality, openness, promptness, fairness, expandability and convenience.  相似文献   
19.
近年来,由于网贷行为存在大量风险,国家收紧对P2P网贷的管控,逐步清理不良P2P网贷。分析发现,无论是网贷个人还是网贷平台,均因制度的漏洞、监管力度的缺失和行业协会职能弱化等原因,衍生出诸多社会性问题。因此,应进一步发挥监督职能,完善网贷公司的线下年检机制、建立市场准入和退市监管机制、健全第三方金融机构担保模式、规范资金银行存管制度等监管措施,并以发挥行业协会职能为手段,完善互联网行业监管自律和建立常态化网贷风险监测披露等机制,实现对P2P网贷的有效管控,规范其良性发展,降低风险机率,减少其社会危害性,营造健康的社会经济发展环境。  相似文献   
20.
针对对等网知识资源共享模式缺乏语义支持的不足,借鉴利用本体进行信息语义处理的方法,提出一种面向用户的对等网知识资源语义共享模型框架。该共享模型要求对等网中的对等节点具有相同的节点共享架构,该节点共享架构包含5个功能模块:本体管理模块、节点共享信息资源管理模块、用户模型管理模块、查询处理模块和邻接节点管理模块,并分析该框架模型的作用。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号