歪歪2017

积分:746
上传文件:17
下载次数:42
注册日期:2009-11-25 13:24:46

上传列表
rfc5016.txt.rar - Abstract DomainKeys Identified Mail (DKIM) provides a cryptographic mechanism for domains to assert responsibility for the messages they handle. A related mechanism will allow an administrator to publish various statements about their DKIM signing practices. This document defines requirements for this mechanism, distinguishing between those that must be satisfied (MUST), and those that are highly desirable (SHOULD).,2010-12-15 16:21:27,下载2次
rfc5015.txt.rar - This document discusses Bidirectional PIM (BIDIR-PIM), a variant of PIM Sparse-Mode that builds bidirectional shared trees connecting multicast sources and receivers. Bidirectional trees are built using a fail-safe Designated Forwarder (DF) election mechanism operating on each link of a multicast topology. With the assistance of the DF, multicast data is natively forwarded from sources to the Rendezvous- Point (RP) and hence along the shared tree to receivers without requiring source-specific state. The DF election takes place at RP discovery time and provides the route to the RP, thus eliminating the requirement for data-driven protocol events.,2010-12-15 16:20:39,下载1次
rfc5013.txt.rar - Abstract This document defines fifteen metadata elements for resource description in a cross-disciplinary information environment.,2010-12-15 16:09:17,下载2次
rfc5012.txt.rar - Abstract This document defines terminology and enumerates requirements for the context resolution of emergency calls placed by the public using voice-over-IP (VoIP) and general Internet multimedia systems, where Internet protocols are used end to end.,2010-12-15 16:08:20,下载1次
rfc5011.txt.rar - Abstract This document describes a means for automated, authenticated, and authorized updating of DNSSEC "trust anchors". The method provides protection against N-1 key compromises of N keys in the trust point key set. Based on the trust established by the presence of a current anchor, other anchors may be added at the same place in the hierarchy, and, ultimately, supplant the existing anchor(s). This mechanism will require changes to resolver management behavior (but not resolver resolution behavior), and the addition of a single flag bit to the DNSKEY record.,2010-12-15 16:07:27,下载2次
rfc5010.txt.rar - Abstract This memo defines a new suboption of the Dynamic Host Configuration Protocol (DHCP) relay agent information option that allows the DHCP relay to specify flags for the forwarded packet. One flag is defined to indicate whether the DHCP relay received the packet via a unicast or broadcast packet. This information may be used by the DHCP server to better serve clients based on whether their request was originally broadcast or unicast.,2010-12-15 16:05:43,下载2次
rfc5009.txt.rar - This document describes a private Session Initiation Protocol (SIP) header field (P-header) to be used by the European Telecommunications Standards Institute (ETSI) Telecommunications and Internet-converged Services and Protocols for Advanced Networks (TISPAN) for the purpose of authorizing early media flows in Third Generation Partnership Project (3GPP) IP Multimedia Subsystems (IMS). This header field is useful in any SIP network that is interconnected with other SIP networks and needs to control the flow of media in the early dialog state.,2010-12-15 16:04:48,下载3次
rfc5007.txt.rar - This document specifies a leasequery exchange for the Dynamic Host Configuration Protocol for IPv6 (DHCPv6) that can be used to obtain lease information about DHCPv6 clients from a DHCPv6 server. This document specifies the scope of data that can be retrieved as well as both DHCPv6 leasequery requestor and server behavior. This document extends DHCPv6.,2010-12-15 16:02:53,下载9次
rfc5006.txt.rar - This document specifies a new IPv6 Router Advertisement option to allow IPv6 routers to advertise DNS recursive server addresses to IPv6 hosts.,2010-12-15 16:01:57,下载3次
rfc5005.txt.rar - Abstract This specification defines three types of syndicated Web feeds that enable publication of entries across one or more feed documents. This includes "paged" feeds for piecemeal access, "archived" feeds that allow reconstruction of the feed’s contents, and feeds that are explicitly "complete".,2010-12-15 16:00:25,下载2次
rfc5004.txt.rar - Abstract In this document, we propose an extension to the BGP route selection rules that would avoid unnecessary best path transitions between external paths under certain conditions. The proposed extension would help the overall network stability, and more importantly, would eliminate certain BGP route oscillations in which more than one external path from one BGP speaker contributes to the churn.,2010-12-15 15:58:46,下载2次
rfc5003.txt.rar - Abstract The signaling protocols used to establish point-to-point pseudowires include type-length-value (TLV) fields that identify pseudowire endpoints called attachment individual identifiers (AIIs). This document defines AII structures in the form of new AII TLV fields that support AII aggregation for improved scalability and Virtual Private Network (VPN) auto-discovery. It is envisioned that this would be useful in large inter-domain virtual private wire service networks where pseudowires are established between selected local and remote provider edge (PE) nodes based on customer need.,2010-12-15 15:51:02,下载3次
rfc5002.txt.rar - Abstract This document specifies the SIP P-Profile-Key P-header. This header field is used in the 3rd-Generation Partnership Project (3GPP) IMS (IP Multimedia Subsystem) to provide SIP registrars and SIP proxy servers with the key of the profile corresponding to the destination SIP URI of a particular SIP request.,2010-12-15 15:49:45,下载2次
rfc5001.txt.rar - Abstract With the increased use of DNS anycast, load balancing, and other mechanisms allowing more than one DNS name server to share a single IP address, it is sometimes difficult to tell which of a pool of name servers has answered a particular query. While existing ad-hoc mechanisms allow an operator to send follow-up queries when it is necessary to debug such a configuration, the only completely reliable way to obtain the identity of the name server that responded is to have the name server include this information in the response itself. This note defines a protocol extension to support this functionality.,2010-12-15 15:48:29,下载4次
VisualCPPMFC.rar - Visual C++ MFC 简明教程 原著:Marshall Brain,2010-12-15 15:44:04,下载3次
A.Blind.MPEG-2.Video.Watermarking.Robust.to.Regula - Abstract—Based on the observation that low-frequency DCT coefficients of an image are less affected by geometric processing, we propose a new blind MPEG-2 video watermarking algorithm robust to camcorder recording. Both the embedding and extraction of the watermarks are done in the compressed domain. The mean of the low-frequency DCT coefficients of the video is temporally modulated according to the information bits. To reduce complexity, we embed watermark in the prediction error signals of the B-frames. Experimental results show that the proposed scheme achieves high video quality and robustness to camcorder recording, trans-coding, frame-rate conversion, and geometric attacks on common test videos.,2010-12-15 15:36:51,下载12次
A.Blind.and.Robust.Watermarking.Scheme.rar - Abstract- H.264/AVC is becoming a popular video codec for its better compression ratio, lower distortion and applicability to portable electronic devices. Thus, issues of copyright protection appropriate for this standard become very important. In this paper, a new blind SVD (Singular Value Decomposition) - DCT combined video watermarking scheme for the ".264 standard is proposed. The proposed method is a blind watermarking algorithm as the hidden information can be extracted without the original video and the original singular values. To reduce visual quality degradation caused by coefficients modifying, the perceptual model and block selection mechanism are introduced to control the modification strength. The performance of the proposed algorithm is evaluated with respect to imperceptibility, robustness and data payload. Experimental results reveal that the proposed scheme achieves enough robustness while preserving the perceptual quality.,2010-12-15 15:34:53,下载20次

近期下载

收藏