Intrusion Detection System Testing Based on CASL
zhao kuo~1; hu liang~1; li bo~1; kong ling-zhi~1; xu hong-jing~2(1.college of computer science and technology; jilin university; changchun 130012; china; 2.communication science institute of jilin province; changchun 130062; china)
..............page:50-58
Comparison of RED and Droptail Algorithms Based on Router
yang xiao-ping~1; chen hong~1; zhai shuang~2(1.college of communication engineering; jilin university; changchun 130025; china; 2.college of computer science and engineering; changchun university and technology; changchun 130012; china)
..............page:69-74
Implementation of NGN'QoS Based on MPLS
zhao hong-bo~(1; 2); yang yong-jian~1; zhang chi-jun~1(1.college of computer science and technology; jilin university; changchun 130012; china; 2.unit 91286; the pla; qingdao 26603; china)
..............page:102-106
..............page:107-112
..............page:97-101
On Applications of "Metadata Model" to Data Extraction
yang wen-an; chen xing-yi(1.department of computer engineering; xuzhou institute of architectural technology; xuzhou 221008; china; 2.school of computer science and technology; beijing posts and telecommunications university; beijing 100876; china)
..............page:32-36