Computer and Modernization ›› 2010, Vol. 1 ›› Issue (10): 129-132.doi: 10.3969/j.issn.1006-2475.2010.10.034
• 网络与通信 • Previous Articles Next Articles
SONG Hai-jun, ZHOU Tong
Received:
2010-06-25
Revised:
1900-01-01
Online:
2010-10-21
Published:
2010-10-21
CLC Number:
SONG Hai-jun;ZHOU Tong. Research on Two Exit Campus Network Routing Control Technology[J]. Computer and Modernization, 2010, 1(10): 129-132.
Add to citation manager EndNote|Ris|BibTeX
URL: http://www.c-a-m.org.cn/EN/10.3969/j.issn.1006-2475.2010.10.034
[1] | WANG Hong-jie, XU Sheng-chao, YANG Bo, MAO Ming-yang, JIANG Jin-ling. Automatic Arrangement Method of Cloud Network Security Service Chain Based on SRv6 Technology [J]. Computer and Modernization, 2024, 0(01): 1-5. |
[2] | HU Chong-jia, LIU Jin-zhou, FANG Li. Unsupervised Domain Adaptation for Outdoor Point Cloud Semantic Segmentation [J]. Computer and Modernization, 2024, 0(01): 74-79. |
[3] | HUANG Yu-ting, CHEN Lin, LIN Hong-gang, . An Importance Assessment Method of Network Assets in Critical Information Infrastructure Based on Percolation Theory [J]. Computer and Modernization, 2023, 0(11): 51-56. |
[4] | CHEN Chen, ZHUANG Yi, GAO Zeng. QoE-driven High-availability Transmission Framework for SDN [J]. Computer and Modernization, 2023, 0(11): 62-68. |
[5] | LI Xiang, ZHUANG Yi. Critical Fault Point Identification Method for Routing Algorithms Using XGBoost [J]. Computer and Modernization, 2023, 0(11): 75-81. |
[6] | JIANG Hou-hai, ZHUANG Yi, CAO Zi-ning. A Fast Failure Recovery Scheme for SDN Based on Flow Aggregation and Congestion Avoidance [J]. Computer and Modernization, 2023, 0(10): 77-83. |
[7] | WANG Hong-jie, XU Sheng-chao. Clustering Method of Cloud Platform Abnormal Transmission Data Based on Hilbert Similarity [J]. Computer and Modernization, 2023, 0(09): 27-31. |
[8] | YANG Liu-qing, WANG Chong. Personalized Recommendation Method of Web Service Resources Based on Maximum Entropy [J]. Computer and Modernization, 2023, 0(09): 32-37. |
[9] | JIANG Hou-hai, ZHUANG Yi, CAO Zi-ning. SDN Reliability Evaluation Algorithm Based on Improved BDD [J]. Computer and Modernization, 2023, 0(09): 64-69. |
[10] | XIAO Hang, LI Peng, MA Hui-ping, ZHU Feng, . RFID System Security Analysis Model Based on Stochastic Petri Net [J]. Computer and Modernization, 2023, 0(09): 105-114. |
[11] | CHEN Gang, WANG Zhi-jian, XU Sheng-chao. Mobile Edge Computing Task Offloading Based on Feasible Point Tracking Continuous#br# Convex Approximation [J]. Computer and Modernization, 2023, 0(08): 93-97. |
[12] | YANG Bo, XU Sheng-chao. Security Protection Method of Cloud Network Special Line Scenarios Based on SRv6#br# Service Chain [J]. Computer and Modernization, 2023, 0(08): 107-111. |
[13] | LEI Yi-han, CAO Li-feng, HAN Meng-da, HAN Xue. Security Handover Architecture and Method for Software Defined Space-ground#br# Integration Network [J]. Computer and Modernization, 2023, 0(08): 119-126. |
[14] | WANG Liu, ZHU Yi-xin, HAN Li-ying. Opinion Leaders Mining Method Based on Improved Hits Algorithm [J]. Computer and Modernization, 2023, 0(06): 39-42. |
[15] | LI Jin-hai, HU Xu. Analysis of Hot Topics of College Online Public Opinion Based on Baidu Tieba [J]. Computer and Modernization, 2020, 0(09): 12-18. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||