Showing 3,621 - 3,640 results of 4,324 for search '"Nanjing"', query time: 0.06s Refine Results
  1. 3621

    Survey of big-data-analysis-resistant privacy protection by Wei TONG, AOYun-long M, Qing-jun CEHN, Bin-ru WANG, Bao-jia ZHANG, Sheng ZHONG

    Published 2016-04-01
    “…Privacy protection plays a significant role in big data era for data sharing and analysis.Traditional privacy protection approaches may not apply well for big data scenarios,because there may exist deep associations which can also cause privacy leakages.Therefore,privacy protection mechanisms that can defend against big data analysis is needed.A survey on related works was conducted,and the previous works were classified into three categories:privacy protection for massive high-dimensional heterogeneous data,location privacy protection and privacy protec-tion with enhanced utility.Then,the works in this area by COSEC group from nanjing university were introduced.At last,the privacy protection against big data analysis which was important and forward-looking was concluded,and the possible directions in this research area were introduced.…”
    Get full text
    Article
  2. 3622

    A general way to assign IPv6 trusted address under portal authentication by Jiang ZHOU, Hewu LI

    Published 2019-12-01
    “…As the network scale grows,it is especially important to fine-tune the network.In the next-generation Internet,embedding the user's trusted identity into the IPv6 address suffix to assign trusted addresses can further improve the traceability of network behavior.At present,many studies have attempted to embed the user’s identity information into IPv6 addresses based on portal authentication and DHCPv6,but the modification of DHCPv6 makes it not transparent to the terminal.A mechanism for trusted address assignment in IPv6 networks based on portal authentication was proposed.The collaboration between servers and software-defined networking (SDN) technology was used to realize the indirect assignment of IPv6 trusted addresses.Finally,a prototype system was implemented and its feasibility and performance were evaluated in the network of Nanjing Telecom in Jiangsu.The results show that the mechanism only brings little overhead and it is transparent to the terminal.…”
    Get full text
    Article
  3. 3623
  4. 3624
  5. 3625
  6. 3626
  7. 3627
  8. 3628
  9. 3629
  10. 3630

    Modeling the Effects of Bus Stops on Bicycle Traffic Flow by Cellular Automata by Zhaoguo Huang, Xiucheng Guo, Chunbo Zhang, Hongying Zhang

    Published 2018-01-01
    “…In this paper, we proposed the test in several bicycle paths beside bus stops in Nanjing and aimed at exploring the specific effects of bus stop on the bicycle flow nearby. …”
    Get full text
    Article
  11. 3631
  12. 3632
  13. 3633
  14. 3634
  15. 3635
  16. 3636
  17. 3637
  18. 3638
  19. 3639
  20. 3640