高性能包分类技术及其应用研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着计算机硬件体系结构和虚拟网络的迅猛发展,包分类(PacketClassification)的运行模式发生了显著的变化:首先,包分类的物理路由平台从单核处理器向多核处理器过渡;其次,一个物理路由器需要被复用为大量的虚拟路由器。本文针对包分类运行模式的变化,研究支持大规模规则库的高效多维包分类算法,以及在多核处理器路由平台上支持多虚拟路由器的高效包分类技术,最后将提出的算法应用到网络新型业务的流量识别中。
     (1)支持大规模规则库的高效多维包分类算法包括:基于规则集压缩的多维包分类决策树研究和基于并行分布式联合布鲁姆过滤器的包分类算法。
     基于规则集压缩的多维包分类决策树研究包括两个部分,首先提出基于规则集压缩的二维地址前缀匹配算法EGT-SC(Extended Grid of Triewith Sets Compression)。然后,针对新型业务的包分类规则库特点,提出在多维多模式匹配情况下的四种包分类决策树,通过实验比较这些决策树的时间和空间性能差异,进而得出适合新型业务包分类的最佳算法。
     基于并行分布式联合布鲁姆过滤器的包分类算法PDCBF(ParallelDistributed Combination Bloom Filter)分为两个阶段:规则存储阶段和包匹配阶段,两个阶段的核心部件都是聚合结点。在规则存储阶段,算法将所有规则依据协议存放到三个匹配逻辑单元中,相对原始数据包匹配规则数目来说,每个逻辑单元的待匹配规则数目大大减少。包匹配阶段分为三个步骤,协议匹配、地址的单域匹配和聚合匹配。理论分析和实验结果表明,PDCBF算法包匹配效率高、硬件资源消耗合理、包分类准确率高,是一种支持大规模规则库的高效多维包分类算法。
     (2)在多核处理器路由平台上支持多虚拟路由器的包分类技术包括基于演化博弈(非合作博弈)和基于联盟博弈(合作博弈)的多虚拟路由器的多核动态选择算法。
     非合作博弈方面,通过多个独立群体的演化博弈分析和建模多虚拟路由器的多核动态选择行为,演化均衡的策略分布作为最后的解。本文基于演化博弈模型提出了三种演化算法:群体演化算法、强化学习算法和基于均衡迭代方程的分布式演化算法。实验结果表明,三种算法都能够实现多核的负载均衡,保障各个虚拟路由器公平地使用计算资源,并且维持系统稳定的高吞吐量。基于均衡迭代方程的分布式演化算法比群体演化算法和强化学习算法具有更快的收敛速度。
     合作博弈方面,本文针对多虚拟路由器的多核动态选择问题建立联盟博弈模型,通过联盟形成的过程设计了一个多核选择算法,即核联盟算法。算法中,核与核之间组成联盟,每个核可以属于不同的联盟,由一个联盟组成的集合为虚拟路由器提供计算服务。实验结果表明,算法可以有效地实现多核的负载均衡和维持系统稳定的高吞吐量。
     (3)新型业务的流量识别技术包括两个部分:基于H.323协议的VoIP语音流量识别技术和一种高效的P2P流量识别技术。
     本文通过分析基于H.323协议的VoIP语音通信过程中出现的会话特征,提取出通信方的元组信息,进而识别整个语音会话流量。同时,设计相应流结点的存储、搜索和更新方案,提出一种H.323语音流量的识别算法。仿真实验结果表明,与传统流量识别方法相比,本文算法能够更加准确地识别基于H.323协议的VoIP语音流量。
     针对目前网络中典型的P2P应用,本文通过分析通信终端会话过程中的特征,提取数据传输通道的五元组信息,建立P2P流量的识别规则库,并且设计相应的流存储结构和提出一种识别P2P流量的高效包分类算法。仿真实验和实际的链路测试结果表明,与基于端口的识别方法和基于行为特征的识别方法相比,本文算法具有更高的识别精度和更快的识别速度,可以有效地进行多种协议的P2P应用的流量识别,具有实际应用价值。
With the rapid development of computer hardware architecture and virtual network, the operational mode of packet classification has changed dramatically. First, the physical routing platform of packet classification has been transforming from single-core processors to multi-core processors. Second, a physical router needs to be multiplexed as a large number of virtual routers. In order to solve the problems brought by the changing operational mode of packet classification, this paper focuses on efficient multi-dimensional packet classification algorithms which can support large-scale rule sets, and efficient packet classification technology which can support multiple virtual routers on a multi-core processor routing platform. Moreover, the new proposed algorithms in this paper are applied to traffic identification of new network services.
     (1) This paper proposes two efficient multi-dimensional packet classification algorithms supporting large-scale rule sets. They are respectively the multi-dimensional packet classification decision trees based on sets compression and the packet classification algorithm based on parallel distributed combination bloom filters.
     The study of multi-dimensional packet classification decision trees based on sets compression consists of two parts. First, a two-dimensional address prefix matching algorithm based on sets compression EGT-SC (Extended Grid of the Trie with Sets Compression) is firstly proposed. Then according to the characteristics of rule sets in new services, four packet classification decision trees applied to multi-dimensional multi-mode matching are presented. Finally, several experiments are carried out to compare time performance and space performance of the four decision trees and the most suitable packet classification algorithm to new services is found.
     The packet classification algorithm based on parallel distributed combination bloom filter PDCBF (Parallel Distributed Combination Bloom Filter) is divided into two stages. They are the stage of rules storage and the stage of packet matching. The core components of the two stages are the aggregation nodes. In the stage of rules storage, the algorithm divides all the original rule sets into three matching logical units based on protocol. Compared with the numbers of the original packet matching rules, the scale of rule sets for packet matching is greatly reduced. In the stage of packet matching, there are three matching steps, and they are protocol matching, address single-field matching and aggregation matching. The theoretical analysis and experimental results show that PDCBF algorithm has the features of high-efficient packet matching, reasonable consumption of hardware resources and high-accurate packet classification. And it is an efficient multi-dimensional packet classification algorithm for large-scale rule sets.
     (2) The packet classification techniques supporting multiple virtual routers on the multi-core processor routing platform include two multi-core dynamic selection algorithms for multiple virtual routers, and they are respectively based on evolutionary game (non-cooperative game) and coalitional game (cooperative game).
     The multi-core dynamic selection behaviors of multiple virtual routers are analyzed and modeled by multiple independent groups in evolutionary game. The strategy distribution of evolutionary equilibrium is the final solution. This paper proposes three evolutionary algorithms based on evolutionary game model. The three evolutionary algorithms are respectively the population evolution algorithm, the reinforcement learning algorithm and the distributed evolutionary algorithm. The experimental results show that the three algorithms are able to achieve balanced loads among the cores, guarantee fair use of computing resources among virtual routers and maintain stable high-throughput of the system. Distributed evolutionary algorithm based on the balanced iterative equation has faster convergence speed than the other two algorithms.
     This paper also constructs a coalitional game model to solve the problem of multi-core dynamic selection for multiple virtual routers. Then an efficient multiprocessor selection scheme based on the process of coalition formation is presented. In this algorithm, it is the cores that constitute coalitions in order to increase the throughput performance of the system. A core can belong to different coalitions, and a whole coalition services for virtual routers. The simulation results demonstrate that our algorithm can effectively support load balance and maintain stable high-throughputs of the system.
     (3) This paper proposes two traffic identification techniques for new network services. They are respectively a H.323-based VoIP traffic identification technique and an efficient P2P traffic identification technique.
     This paper firstly analyzes the H.323protocol and the session characteristics in the communication process. By extracting tuple information of the communication participant, the whole VoIP traffic can be identified. Then a scheme of storage, search and update for traffic nodes is designed and a H.323-based VoIP traffic identification algorithm is proposed. The simulation results show that our algorithm can identify the H.323-based VoIP voice traffic more accurately, compared with the traditional traffic identification method.
     For the typical P2P applications in the network, this paper extracts the five-tuple information in the data transmission channel by analyzing the characteristics of communication terminal session. Then a rule set for identifying P2P traffic is built and an efficient packet classification algorithm for identifying P2P traffic is proposed. The simulation and actual link testing results show that compared with the port-based and the host-behavior-based identification methods, the proposed algorithm has higher identification accuracy and faster identification speed. And it can effectively identify P2P application traffic of multiple protocols and is of more practical value.
引文
[1]Dixit M, Barbadekar B V, Barbadekar A B. Packet classification algorithms. In:Proc. of IEEE International Symposium on Industrial Electronics (ISIE). Washington:IEEE Computer Society Press,2009,1407-1412
    [2]Sahni S. Data structures and algorithms for packet forwarding and classification. In:Proc. of10th International Symposium on Pervasive Systems, Algorithms, and Networks (ISPAN). Washington: IEEE Computer Society Press,2009,3
    [3]Feldman A, Muthukrishnan S. Tradeoffs for packet classification. In: Proc. of IEEE INFOCOM. Washington:IEEE Computer Society Press,2000,1193-1202
    [4]Wang P, Chan C, Hu S, et al. High-speed packet classification for differentiated services in next-generation networks. IEEE Transactions on Multimedia,2004,6(6):925-935
    [5]Gao X. The model of QoS-aware service composition on P2P network. In:Proc. of Fourth International Joint Conference on Computational Sciences and Optimization (CSO). Washington:IEEE Computer Society Press,2011,280-283
    [6]Chen G, Hu K. Design service level agreement based on dynamic IT. In:Proc. of Pacific-Asia Conference on Knowledge Engineering and Software Engineering (KESE). Washington:Washington:IEEE Computer Society Press,2009,21-24
    [7]Liu A X, Gouda M G. Firewall policy queries. IEEE Transactions on Parallel and Distributed Systems,2009,20(6):766-777
    [8]Chen F, Bruhadeshwar B, Liu A X. A cross-domain privacy-preserving protocol for cooperative firewall optimization. In: Proc. of IEEE INFOCOM. Washington:IEEE Computer Society Press,2011,2903-2911
    [9]Batayneh M, Schupke D, Hoffmann M, et al. Reliable multi-bit-rate VPN provisioning for multipoint carrier-grade Ethernet services over mixed-line-rate WDM optical networks. IEEE/OSA Journal of Optical Communications and Networking,2011,3(1):66-76
    [10]Houidi Z B, Meulle M. A new VPN routing approach for large scale networks. In:Proc. of IEEE ICNP. Washington:IEEE Computer Society Press,2010,124-133
    [11]Loureiro P, Liebsch M, Schmid S. Policy routing architecture for IP flow mobility in3GPP's evolved packet core. In:Proc. of IEEE GLOBECOM Workshops. Washington:IEEE Computer Society Press,2010,2000-2005
    [12]Cittadini L, Di Battista G, Rimondini M, et al. Wheel+ring=reel: the impact of route filtering on the stability of policy routing. In: Proc. of IEEE ICNP. Washington:IEEE Computer Society Press,2009,274-283
    [13]Ohize H O, Onwuka E N. Impact of differentiated service billing on the quality of service of an IP network. In:Proc. of2nd International Conference on Computer Technology and Development (ICCTD). Washington:IEEE Computer Society Press,2010,739-743
    [14]Park K W, Park S K, Han J, et al. THEMIS:Towards mutually verifiable billing transactions in the cloud computing environment. In:Proc. of IEEE3rd International Conference on Cloud Computing (CLOUD). Washington:IEEE Computer Society Press,2010,139-147
    [15]Wang J, Qiu L, He Q, et al. Quasi-dynamic traffic assignment method based on traffic control strategy under freeway net. In:Proc. of International Conference on Intelligent Computation Technology and Automation (ICICTA). Washington:IEEE Computer Society Press,2010,959-962
    [16]Wang Y, Vrancken J, Soares M. Intelligent network traffic control by integrating top-down and bottom-up control. In:Proc. of Chinese Control and Decision Conference (CCDC). Washington:IEEE Computer Society Press,2009,1557-1562
    [17]Truong T X, Lan L H, Viet N D, et al. Congestion control in TCP/IP differentiated services network using neural network. In:Proc. of Seventh International Conference on Natural Computation (ICNC). Washington:IEEE Computer Society Press,2011,686-690
    [18]Liu P Z, Miao J L, Dai S Q. The design and implementation of a scheduling mechanism of differentiated services based on priority. In: Proc. of WRI International Conference on Communications and Mobile Computing (CMC). Washington:IEEE Computer Society Press,2009,510-514
    [19]Chan A, Liew S C. Performance of VoIP over multiple co-located IEEE802.11wireless LANs. IEEE Transactions on Mobile Computing,2009,8(8):1063-1076
    [20]Lan K, Wu T. Evaluating the perceived quality of infrastructure-less VoIP. In:Proc. of IEEE International Conference on Multimedia and Expo (ICME). Washington:IEEE Computer Society Press,2011,1-6
    [21]Son H, Lee Y. Detecting anomaly traffic using flow data in the real VoIP network. In:Proc. of10th IEEE/IPSJ International Symposium on Applications and the Internet (SAINT). Washington:IEEE Computer Society Press,2010,253-256
    [22]Narayan S, Shi Y. Application layer network performance evaluation of VoIP traffic on a test-bed with IPv4and IPv6LAN infrastructure. In:Proc. of IEEE Region8International Conference on Computational Technologies in Electrical and Electronics Engineering (SIBIRCON). Washington:IEEE Computer Society Press,2010,215-219
    [23]Hamdaqa M, Tahvildari L. ReLACK:A reliable VoIP steganography approach. In:Proc. of Fifth International Conference on Secure Software Integration and Reliability Improvement (SSIRI). Washington:IEEE Computer Society Press,2011,189-197
    [24]Abdel Alim O, Shaaban S, Hamdy M N. Adaptive multi lane technique for LTE radio access VoIP. In:Proc. of International Conference on Advanced Technologies for Communications (ATC). Washington:IEEE Computer Society Press,2011,183-186
    [25]Shah N, Qian D. Cross-layer design to merge structured P2P networks over MANET. In:Proc. of IEEE16th International Conference on Parallel and Distributed Systems (ICPADS). Washington:IEEE Computer Society Press,2010,851-856
    [26]Li Z, Goyal A, ChenY, et al. Measurement and diagnosis of address misconfigured P2P traffic. IEEE Network,2011,25(3):22-28
    [27]Lee C, Kim S, Kang S. A framework for context-aware P2P service. In:Proc. of IEEE Asia-Pacific Services Computing Conference (APSCC). Washington:IEEE Computer Society Press,2011,498-502
    [28]Liu T, Chen X. A novel approach to detect P2P traffic based on program behavior analysis. In:Proc. of IEEE17th International Conference on Electrical and Control Engineering (ICECE). Washington:IEEE Computer Society Press,2011,5677-5680
    [29]Lu Z, Gao X, Huang S, et al. Scalable and reliable live streaming service through coordinating CDN and P2P. In:Proc. of International Conference on Parallel and Distributed Systems (ICPADS). Washington:IEEE Computer Society Press,2011,581-588
    [30]Liu Y, Li Y, Yang L T, et al. The resource locating strategy based on sub-domain hybrid P2P network model. In:Proc. of IEEE International Symposium on Parallel&Distributed Processing, Workshops and Phd Forum (IPDPSW). Washington:IEEE Computer Society Press,2010,1-8
    [31]Tong X, Zhao Z, Shuai H, et al. The analysis of worm non-linear propagation model and the design of worm distributed detection technology. In:Proc. of Ninth International Symposium on Distributed Computing and Applications to Business Engineering and Science (DCABES). Washington:IEEE Computer Society Press,2010,219-223
    [32]Zhang D, Wang Y. SIRS:Internet worm propagation model and application. In:Proc. of International Conference on Electrical and Control Engineering (ICECE). Washington:IEEE Computer Society Press,2010,3029-3032
    [33]Su F, Lin Z, Ma Y. Effects of firewall on worm propagation. In:Proc. of IEEE International Conference on Communications Technology and Applications (ICCTA). Washington:IEEE Computer Society Press,2009,880-884
    [34]Luo W, Liu J, Liu J, et al. An exact model for active P2P worms propagation. In:Proc. of Fourth International Conference on Frontier of Computer Science and Technology (FCST). Washington:IEEE Computer Society Press,2009,553-558
    [35]Yu W, Wang X, Calyam P, et al. Modeling and detection of camouflaging worm. IEEE Transactions on Dependable and Secure Computing,2011,8(3):377-390
    [36]Kuang X, Huang M, Wen Y, et al. Hybrid network worm emulation and analysis. In Proc. of International Forum on Information Technology and Applications (IFITA). Washington:IEEE Computer Society Press,2010,62-66
    [37]Song H, Kodialam M, Hao F, et al. Building scalable virtual routers with trie braiding. In:Proc. of IEEE INFOCOM. Washington:IEEE Computer Society Press,2010,1-9
    [38]Song H, Kodialam M, Hao F, et al. Efficient trie braiding in scalable virtual routers. IEEE/ACM Transactions on Networking,2012, PP(99):1-12
    [39]Zhang D, Wu C, Xiong W, et al. Research on virtual network design based on virtual router. In:Proc. of First International Conference on Future Information Networks (ICFIN). Washington:IEEE Computer Society Press,2009,66-69
    [40]Erdem O, Le, H, Prasanna V K, et al. Hybrid data structure for IP lookup in virtual routers using FPGAs. In:Proc. of IEEE International Conference on Application-Specific Systems, Architectures and Processors (ASAP). Washington:IEEE Computer Society Press,2011,95-102
    [41]Hadi F E, Naseer A, Bashir F, et al. An evaluation of the virtual router redundancy protocol extension with multi segment load balancing. In:Proc. of IEEE International Symposium on Signal Processing and Information Technology (ISSPIT). Washington:IEEE Computer Society Press,2009,446-450
    [42]Choi H F W, Lee P P C. An extensible design of a load-aware virtual router monitor in user space. In:Proc. of40th International Conference on Parallel Processing Workshops (ICPPW). Washington: IEEE Computer Society Press,2011,361-370
    [43]Xie G, He P, Guan H, et al. PEARL:A programmable virtual router platform. IEEE Communications Magazine,2011,49(7):71-77
    [44]Rathore M S, Hidell M, Sjodin P. Performance evaluation of open virtual routers. In:Proc. of IEEE GLOBECOM Workshops. Washington:IEEE Computer Society Press,2010,288-293
    [45]Bozakov Z. Architecture and algorithms for virtual routers as a service. In:Proc. of IEEE19th International Workshop on Quality of Service (IWQoS). Washington:IEEE Computer Society Press,2011,1-3
    [46]Rojas-Cessa R, Salehin K M, Egoh K. Experimental performance evaluation of a virtual software router. In:Proc. of18th IEEE Workshop on Local&Metropolitan Area Networks (LANMAN). Washington:IEEE Computer Society Press,2011,1-2
    [47]Bourguiba M, Haddadou K, Pujolle G. Evaluating and enhancing xen-based virtual routers to support real-time applications. In:Proc. of7th IEEE Consumer Communications and Networking Conference (CCNC). Washington:IEEE Computer Society Press,2010,1-5
    [48]Goyette R, Karmouch A. A virtual network topology security assessment process. In:Proc. of7th International Wireless Communications and Mobile Computing Conference (IWCMC). Washington:IEEE Computer Society Press,2011,974-979
    [49]Lee J, Moon I. Research on virtual network for virtual mobile network. In:Proc. of Second International Conference on Computer and Network Technology (ICCNT). Washington:IEEE Computer Society Press,2010,98-101
    [50]Yang Y, Chen S, Li X, et al. RMap:An algorithm of virtual network resilience mapping. In:Proc. of7th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). Washington:IEEE Computer Society Press,2011,1-4
    [51]Cai Z, Liu F, Xiao N, et al. Virtual network embedding for evolving networks. In:Proc. of IEEE GLOBECOM. Washington:IEEE Computer Society Press,2010,1-5
    [52]Marquezan C C, Nobre J C, Granville L Z, et al. Distributed reallocation scheme for virtual network resources. In:Proc. of IEEE ICC. Washington:IEEE Computer Society Press,2009,1-5
    [53]Fajjari I, Aitsaadi N, Pujolle, G, et al. VNR algorithm:A greedy approach for virtual networks reconfigurations. In:Proc. of IEEE GLOBECOM. Washington:IEEE Computer Society Press,2011,1-6
    [54]Liu W, Xiang Y, Ma S, et al. Completing virtual network embedding all in one mathematical programming. In:Proc. of International Conference on Electronics, Communications and Control (ICECC). Washington:IEEE Computer Society Press,2011,183-185
    [55]Trinh T, Esaki H, Aswakul C. Quality of service using careful overbooking for optimal virtual network resource allocation. In:Proc. of8th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON). Washington:IEEE Computer Society Press,2011,296-299
    [56]Miyamura T, Kamamura S, Shiomoto K. Policy-based resource management in virtual network environment. In:Proc. of International Conference on Network and Service Management (CNSM). Washington:IEEE Computer Society Press,2010,282-285
    [57]Zhai J, Wang K. Design and implementation of dynamic virtual network. In:Proc. of International Conference on Electronic and Mechanical Engineering and Information Technology (EMEIT). Washington:IEEE Computer Society Press,2011,2131-2134
    [58]Dorta T, Jimenez J, Martin, J L, et al. Overview of FPGA-based multiprocessor systems. In:Proc. of International Conference on Reconfigurable Computing and FPGAs (ReConFig). Washington: IEEE Computer Society Press,2009,273-278
    [59]Nemati F, Nolte T. Resource hold times under multiprocessor static-Priority global scheduling. In:Proc. of IEEE17th International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA). Washington:IEEE Computer Society Press,2011,197-206
    [60]Nogueira A, Calha M. Predictability and efficiency in contemporary hard RTOS for multiprocessor systems. In:Proc. of IEEE17th International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA). Washington:IEEE Computer Society Press,2011,3-8
    [61]Gang Z, Yokoyama T, Tomiyama H, et al. Practical energy-aware scheduling for real-time multiprocessor systems. In:Proc. of15th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA). Washington:IEEE Computer Society Press,2009,383-392
    [62]Moudgill M, Kalashnikov V, Senthilvelan M, et al. Synchronization on heterogeneous multiprocessor systems. In:Proc. of International Symposium on Systems, Architectures, Modeling, and Simulation (SAMOS). Washington:IEEE Computer Society Press,2009,133-139
    [63]Ras J, Cheng A M K. An evaluation of the dynamic and static multiprocessor priority ceiling protocol and the multiprocessor stack resource policy in an SMP system. In:Proc. of15th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS). Washington:IEEE Computer Society Press,2009,13-22
    [64]Anj am F, Wong S, Nadeem F. A shared reconfigurable VLIW multiprocessor system. In:Proc. of IEEE International Symposium on Parallel&Distributed Processing, Workshops and Phd Forum (IPDPSW). Washington:IEEE Computer Society Press,2010,1-8
    [65]Nan G, Stigge M, Wang Y, et al. New response time bounds for fixed priority multiprocessor scheduling. In:Proc. of30th IEEE Real-Time Systems Symposium (RTSS). Washington:IEEE Computer Society Press,2009,387-397
    [66]Boveiri H R. ACO-MTS:A new approach for multiprocessor task scheduling based on ant colony optimization. In:Proc. of International Conference on Intelligent and Advanced Systems (ICIAS). Washington:IEEE Computer Society Press,2010,1-5
    [67]Lee M, Ahn M, Kim E J. Fast secure communications in shared memory multiprocessor systems. IEEE Transactions on Parallel and Distributed Systems,2011,22(10):1714-1721
    [68]Asanovic K, Bodik R, Demmel J, et al. A view of the parallel computing landscape. Communications of the ACM,2009,52(10):56-67
    [69]Gupta P, McKeown N. Algorithms for packet classification. IEEE Network,2001,15(2):24-32
    [70]Ruiz-Sanchez M A, Biersack E W, Dabbous W. Survey and taxonomy of IP address lookup algorithms. IEEE Network,2001,15(2):8-23
    [71]Poh E C, Ewe H T. IPv6packet classification based on flow label, source and destination addresses. In:Proc. of Third International Conference on Information Technology and Applications (ICITA). Washington:IEEE Computer Society Press,2005,659-664
    [72]Chang Y, Lin Y, Su C. A high-speed and memory efficient pipeline architecture for packet classification. In:Proc. of the18th IEEE Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM). Washington:IEEE Computer Society Press,2010,215-218
    [73]Srinivasan V, Varghese G, Suri S, et al. Fast and scalable layer four switching. In:Proc. of ACM SIGCOMM. New York:ACM Press,1998,191-202
    [74]Baboescu F, Sumeet S, Varghese G. Packet classification for core routers:Is there an alternative to CAMs? In:Proc. of IEEE INFOCOM. Washington:IEEE Computer Society Press,2003,53-63
    [75]Gupta P, McKeown N. Packet classification on multiple fields. In: Proc. of ACM SIGCOMM. New York:ACM Press,1999,147-160
    [76]Srinivasan V, Suri S, Varghese G. Packet classification using tuple space search. In:Proc. of ACM SIGCOMM. New York:ACM Press,1999,135-146
    [77]Lim H, Kang M Y, Yim C. Two-dimensional packet classification algorithm using a quad-tree. Computer Communications,2007,30(6):1396-1405
    [78]Gupta P, McKeown N. Classifying packets with hierarchical intelligent cuttings. IEEE Micro,2000,20(1):34-41
    [79]Singh S, Baboescu F, Varghese G, et al. Packet classification using multidimensional cutting. In:Proc. of ACM SIGCOMM. New York: ACM Press,2003,213-224
    [80]Ma Y, Banerjee S, Lu S, et al. Leveraging parallelism for multi-dimensional packet classification on software routers. In:Proc. of ACM SIGMETRICS. New York:ACM Press,2010,227-238
    [81]Zane F, Girija N, Basu A. Coolcams:Power-efficient TCAMs for forwarding engines. In:Proc. of IEEE INFOCOM. Washington:IEEE Computer Society Press,2003,42-52
    [82]Lunteren J V, Engbersen T. Fast and scalable packet classification. IEEE Journal on Selected Areas in Communications,2003,21(4):560-571
    [83]Yu F, Lakshman T V, Motoyama M A, et al. SSA:A power and memory efficient scheme to multi-match packet classification. In: Proc. of ACM/IEEE ANCS. New York:ACM Press,2005,105-113
    [84]Bloom B H. Space/time trade-offs in hash coding with allowable errors. Communications of the ACM,1970,13(7):422-426
    [85]Dharmapurikar S, Krishnamurthy P, Taylor D E. Longest prefix matching using bloom filters. In:Proc. of ACM SIGCOMM. New York:ACM Press,2003,201-212
    [86]Papaefstathiou I, Papaefstathiou V. Memory-efficient5D packet classification at40Gbps. In:Proc. of IEEE INFOCOM. Washington: IEEE Computer Society Press,2007,1370-1378
    [87]Taylor D E. Survey and taxonomy of packet classification techniques. ACM Computing Surveys,2005,37(3):238-275
    [88]Yang B, Qi Y, He F, et al. Discrete bit selection:Towards a bit-level heuristic framework for multi-dimensional packet classification. In: Proc. of IEEE INFOCOM Workshops. Washington:IEEE Computer Society Press,2009,1-2
    [89]Gong X, Wang W, Cheng S. A fast IPv6packet classification algorithm based on efficient multi-bit selection. Computer Communications,2010,33(15):1773-1784
    [90]Kai Z, Hao C, Zhijun W, et al. TCAM-based distributed parallel packet classification algorithm with range-matching solution. In: Proc. of IEEE INFOCOM. Washington:IEEE Computer Society Press,2005,293-303
    [91]Chen Y, Oguntoyinbo O. Power efficient packet classification using cascaded bloom filter and off-the-shelf ternary CAM for WDM networks. Computer Communications,2009,32(2):349-356
    [92]Zheng K, Che H, Wang Z, et al. DPPC-RE:TCAM-based distributed parallel packet classification with range encoding. IEEE Transactions on Computers,2006,55(8):947-961
    [93]Ahmadi M, Wong S. K-stage pipelined bloom filter for packet classification. In:Proc of International Conference on Computational Science and Engineering (CSE). Washington:IEEE Computer Society Press,2009,64-70
    [94]Dharmapurikar S, Song H, Turner J, et al. Fast packet classification using bloom filters. In:Proc. of ACM/IEEE ANCS. Washington: IEEE Computer Society Press,2006,61-70
    [95]Song H, Hao F, Kodialam M, et al. IPv6lookups using distributed and load balanced bloom filters for100Gbps core router line cards. In: Proc. of IEEE INFOCOM. Washington:IEEE Computer Society Press, 2009,2518-2526
    [96]Yu H, Mahapatra R. A memory-efficient hashing by multi-predicate bloom filters for packet classification. In:Proc. of IEEE INFOCOM. Washington:IEEE Computer Society Press,2008,1795-1803
    [97]Song H, Dharmapurikar S, Turner J, et al. Fast hash table lookup using extended bloom filter:An aid to network processing. In:Proc. ACM SIGCOMM. New York:ACM Press,2005,181-192
    [98]Breternitz M, Loh G H, Black B, et al. A segmented bloom filter algorithm for efficient predictors. In:Proc. of20th International Symposium on Computer Architecture and High Performance Computing (SBAC-PAD). Washington:IEEE Computer Society Press,2008,123-130
    [99]Ficara D, Giordano S, Procissi G, et al. Blooming trees: Space-efficient structures for data representation. In:Proc. of IEEE International Conference on Communications. Washington:IEEE Computer Society Press,2008,5828-5832
    [100]Alagu Priya A G, Lim H. Hierarchical packet classification using a bloom filter and rule-priority tries. Computer Communications,2010,33(3):1215-1226
    [101]Lim H, Kim S Y. Tuple pruning using bloom filters for packet classification. IEEE Micro,2010,30(3):48-59
    [102]Hasan J, Cadambi S, Jakkula V, et al. Chisel:A storage-efficient, collision-free hash-based network processing architecture. In:Proc. of33rd International Symposium on Computer Architecture (ISCA). Washington:IEEE Computer Society Press,2006,203-215
    [103]Chazelle B, Kilian J, Rubinfeld R, et al. The bloomier filter:An efficient data structure for static support lookup tables. In:Proc. of the Fifteenth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA). New York:ACM Press,2004,30-39
    [104]Papaefstathiou I, Papaefstathiou V. An innovative low-cost classification scheme for combined multi-Gigabit IP and Ethernet networks. In:Proc. of IEEE ICC. Washington:IEEE Computer Society Press,2006,211-216
    [105]Pong F, Tzeng N. HaRP:Rapid packet classification via hashing round-down prefixes. IEEE Transactions on Parallel and Distributed Systems,2011,22(7):1015-1109
    [106]Choi L, Kim H, Kim S,et al. Scalable packet classification through rulebase partitioning using the maximum entropy hashing. IEEE/ACM Transactions on Networking,2009,17(6):1926-1935
    [107]Vamanan B, Voskuilen G, Vijaykumar T N. EffiCuts:Optimizing packet classification for memory and throughput. In:Proc. of ACM SIGCOMM. New York:ACM Press,2010,207-218
    [108]Xu Y, Liu Z, Zhang Z, et al. An ultra high throughput and memory efficient pipeline architecture for multi-match packet classification without TCAMs. In:Proc. of ACM/IEEE ANCS. New York:ACM Press,2009,189-198
    [109]Chang Y, Lee C, Su C. Multi-Field range encoding for packet classification in TCAM. In:Proc. of IEEE INFOCOM. Washington: IEEE Computer Society Press,2011,196-200
    [110]Sun Y, Kim M S. Tree-based minimization of TCAM entries for packet classification. In:Proc. of7th IEEE Consumer Communications and Networking Conference (CCNC). Washington: IEEE Computer Society Press,2010,1-5
    [111]Meiners C R, Liu A X, Torng E. Topological transformation approaches to TCAM-based packet classification. IEEE/ACM Transactions on Networking,2011,19(1):237-250
    [112]Antichi G, Ficara D, Giordano S, et al. Blooming trees for minimal perfect hashing. In:Proc. of IEEE GLOBECOM. Washington:IEEE Computer Society Press,2008,1-5
    [113]Yi L, Prabhakar B, Bonomi F. Perfect hashing for network applications. In:Proc. of IEEE International Symposium on Information Theory (ISIT). Washington:IEEE Computer Society Press,2006,2774-2778
    [114]Broder A, Mitzenmacher M. A survey:Network applications of bloom filters. Internet Mathematics,2008,1(4):485-509
    [115]Gupta P, Balkman J. PALAC:Packet lookup and classification simulator. User's Manual, Ver.4, Rev.1,2000,1-25
    [116]Taylor D E, Turner J S. ClassBench:A packet classification benchm-ark. In:Proc. of IEEE INFOCOM. Washington:IEEE Computer Soc-iety Press,2005,2068-2079
    [117]Taylor D E, Turner J S. ClassBench:A packet classification benchm-ark. IEEE/ACM Transactions on Networking,2007,15(3):499-511
    [118]Taylor D E, Turner J S. Scalable packet classification using distributed crossproducing of field labels. In:Proc. of IEEE INFOCOM. Washington:IEEE Computer Society Press,2005,269-280
    [119]Guo D, Wu J, Chen H, et al. Theory and network application of dynamic bloom filters. In:Proc. of IEEE INFOCOM. Washington: IEEE Computer Society Press,2006,1-12
    [120]Kang K, Deng Y S. Scalable packet classification via GPU metaprogramming. In:Proc. of Design, Automation&Test in Europe Conference&Exhibition (DATE). Washington:IEEE Computer Society Press,2011,1-4
    [121]Hung C, Wang H, Guo S, et al. Efficient GPGPU-based parallel packet classification. In:Proc. of IEEE TrustCom. Washington:IEEE Computer Society Press,2011,1367-1374
    [122]Erdem O, Le H, Prasanna V K. Clustered hierarchical search structure for large-scale packet classification on FPGA. In:Proc. of International Conference on Field Programmable Logic and Applications (FPL). Washington:IEEE Computer Society Press,2011,201-206
    [123]Sun L, Le H, Prasanna V K. Optimizing decomposition-based packet classification implementation on FPGAs. In:Proc. of International Conference on Reconfigurable Computing and FPGAs (ReConFig). Washington:IEEE Computer Society Press,2011,170-175
    [124]Qi Y, Fong J, Jiang W, et al. Multi-dimensional packet classification on FPGA:100Gbps and beyond. In:Proc. of International Conference on Field-Programmable Technology (FPT). Washington: IEEE Computer Society Press,2010,241-248
    [125]Guinde N, Ziavras S G, Rojas-Cessa R. Efficient packet classification on FPGAs also targeting at manageable memory consumption. In: Proc. of4th International Conference on Signal Processing and Communication Systems (ICSPCS). Washington:IEEE Computer Society Press,2010,1-10
    [126]Wicaksana A, Sasongko, A. Fast and reconfigurable packet classification engine in FPGA-based firewall. In:Proc. of International Conference on Electrical Engineering and Informatics (ICEEI). Washington:IEEE Computer Society Press,2011,1-6
    [127]Vaish N, Kooburat T, De Carli L, et al. Experiences in co-designing a packet classification algorithm and a flexible hardware platform. In: Proc. of ACM/IEEE ANCS. Washington:IEEE Computer Society Press,2011,189-199
    [128]Xu X, Wang H, Xu C. Computer games are an efficient tool for event game theory. In:Proc. of Chinese Control and Decision Conference (CCDC). Washington:IEEE Computer Society Press,2011,3436-3441
    [129]Ma Z, Krings A W. Dynamic hybrid fault modeling and extended evolutionary game theory for reliability, survivability and fault tolerance analyses. IEEE Transactions on Reliability,2011,60(1):180-196
    [130]Centeno E, Reneses J, Wogrin S, et al. Representation of electricity generation capacity expansion by means of game theory models. In: Proc. of8th International Conference on the European Energy Market (EEM). Washington:IEEE Computer Society Press,2011,300-305
    [131]Wen H, Dong A. The analysis of the behavior noise cognition based on evolution game theory. In:Proc. of the2009Fourth International Computer Sciences and Convergence Information Technology (ICCIT). New York:ACM Press,2009,1383-1386
    [132]Li Y, Zhao J, Luo H. Research of Chinese manufacturing system on game-schily theory. In:Proc. of IEEE IEEM. Washington:IEEE Computer Society Press,2009,139-143
    [133]Fan B, Li C. Evolutionary game analysis on hidden irregularity of processing enterprises in dairy supply chain. In:Proc. of International Conference on Management Science and Engineering (ICMSE). Washington:IEEE Computer Society Press,2011,477-482
    [134]Song M, Wang Z, Ma C, et al. Evolutionary game analysis of bank credit retreat. In:Proc. of International Conference on Artificial Intelligence and Education (ICAIE). Washington:IEEE Computer Society Press,2010,499-504
    [135]Guo B, Fang Z. A study of evolutionary game between central government and the local in energy conservation policy implementation. In:Proc. of IEEE International Conference on Grey Systems and Intelligent Services (GSIS). Washington:IEEE Computer Society Press,2011,874-879
    [136]Chen Y, Gao Y, RayLiu K R. An evolutionary game-theoretic approach for image interpolation. In:Proc. of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Washington:IEEE Computer Society Press,2011,989-992
    [137]Zhao W. An evolutionary game model of cooperative enterprise on complexity and stability. In:Proc. of2nd Conference on Environmental Science and Information Application Technology (ESIAT). Washington:IEEE Computer Society Press,2010,87-90
    [138]MA X. Analysis on quality control in food supply chain based on dynamics evolutionary game model. In:Proc. of International Conference on Intelligent Computation Technology and Automation (ICICTA). Washington:IEEE Computer Society Press,2010,698-701
    [139]Lin J, Xiong N, Vasilakos A V, et al. Evolutionary game-based data aggregation model for wireless sensor networks. IET Communications,2011,5(12):1691-1697
    [140]Cho S, Nguyen T. Modeling and dynamics analysis of P2P networks based on evolutionary games. In:Proc. of First International Conference on Advances in P2P Systems (AP2PS). Washington:IEEE Computer Society Press,2009,34-38
    [141]Zhang Y, Chen B. Evolutionary game analysis on cooperation by innovation subjects in regional innovation system. In:Proc. of6th International Conference on Product Innovation Management (ICPIM). Washington:IEEE Computer Society Press,2011,272-275
    [142]Xiong Q. Evolutionary game analysis of security information sharing in virtual enterprise. In:Proc. of International Conference on Management of e-Commerce and e-Government (ICMeCG). Washington:IEEE Computer Society Press,2010,393-397
    [143]Niyato D, Hossain E. Dynamics of network selection in heterogeneo us wireless networks:An evolutionary game approach. IEEE Transac tions on Vehicular Technology,2009,58(4):2008-2017
    [144]Mazenc F, Nuculescu S-I. Lyapunov stability analysis for nonlinear delay systems. Systems and Control Letters,2001,42(4):245-251
    [145]Wu H, Chen S. Cloud database resource calculations optimization based on buzzers and genetic algorithm double-population evolution mechanism. In:Proc. of Cross Strait Quad-Regional Radio Science and Wireless Technology Conference (CSQRWC). Washington:IEEE Computer Society Press,2011,1188-1192
    [146]Andorra I, Landi S, Mas A, et al. Effect of fermentation temperature on microbial population evolution using culture-independent and dependent techniques. Food Research International,2010,43(3):773-779
    [147]Glascher J, Daw N, Dayan P, et al. States versus rewards:Dissociable neural prediction error signals underlying model-based and model-free reinforcement learning. Neuron,2010,66(4):585-595
    [148]Walsh T J, Szita I, Diuk T, et al. Exploring compact reinforcement learning representations with linear regression. In:Proc. of the Twenty-Fifth Conference on Uncertainty in Artificial Intelligence (UAI). New York:ACM Press,2009,591-598
    [149]Yaipairoj S, Harmantzis F C. Auction-based congestion pricing for wireless data services. In:Proc. of IEEE ICC. Washington:IEEE Computer Society Press,2006,1059-1064.
    [150]Aram A, Sarkar S, Singh C. Provider-customer coalitional games. In: Proc. of International Conference on Game Theory for Networks (GameNets). Washington:IEEE Computer Society Press,2009,180-189
    [151]Singh C, Sarkar S, Aram A. Provider-customer coalitional games. IEEE/ACM Transactions on Networking,2011,19(15):1528-1542
    [152]Cheung M, Wong V, Schober R. SINR-based random access for cognitive radio:Distributed algorithm and coalitional game. IEEE Transactions on Wireless Communications,2011,10(11):3887-3897
    [153]Saad W, Alpcan T, Basar T, et al. Coalitional game theory for security risk management. In:Proc. of Fifth International Conference on Internet Monitoring and Protection (ICIMP). Washington:IEEE Computer Society Press,2010,35-40
    [154]Niyato D, Han Z, Saad W, et al. A controlled coalitional game for wireless connection sharing and bandwidth allocation in mobile social networks. In:Proc. of IEEE GLOBECOM. Washington:IEEE Computer Society Press,2010,1-5
    [155]Saad W, Han Z, Poor H V. Coalitional game theory for cooperative micro-grid distribution networks. In:Proc. of IEEE ICC Workshops. Washington:IEEE Computer Society Press,2011,1-5
    [156]Kazemeyni F, Johnsen E B, Owe O, et al. Group selection by nodes in wireless sensor networks using coalitional game theory. In:Proc. of16th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS). Washington:IEEE Computer Society Press,2011,253-262
    [157]Wang W, Kasiri B, Cai J, et al. Distributed cooperative multi-channel spectrum sensing based on dynamic coalitional game. In:Proc. of IEEE GLOBECOM. Washington:IEEE Computer Society Press,2010,1-5
    [158]Li D, Xu Y, Wang X, et al. Coalitional game theoretic approach for secondary spectrum access in cooperative cognitive radio networks. IEEE Transactions on Wireless Communications,2011,10(3):844-856
    [159]Cyconx H L, Hege G, Marpey D, et al. Connecting the worlds: Multipoint videoconferencing integrating H.323and IPv4, SIP and IPv6with autonomous sender authentication. In:Proc. of IEEE13th International Symposium on Consumer Electronics (ISCE). Washington:IEEE Computer Society Press,2009,890-893
    [160]Ho C C, Tang T C, Lee C H, et al. H.323VoIP telephone implementation embedding a low-power SOC processor. In:Proc. of IEEE Conference on Electron Devices and Solid-State Circuits (EDSSC). Washington:IEEE Computer Society Press,2003,163-166
    [161]Milanovic A, Srhljic S, Rainjevic I, et al. Methods for lawful interception in IP telephony networks based on H.323. In:Proc. of IEEE EUROCON. Washington:IEEE Computer Society Press,2003,198-202
    [162]Zhang P, Zhao Y, Hao J. Design and realization of call center system based on H.323. In:Proc. of8th International Conference on Electronic Measurement and Instruments (ICEMI). Washington:IEEE Computer Society Press,2007,2-104-2-107
    [163]Emond B, Scobie D, Allen M, et al. An H.323broadband virtual camera for supporting asynchronous visual communication in large groups. In:Proc. of IEEE International Symposium on Technology and Society (ISTAS). Washington:IEEE Computer Society Press,2008,1-4
    [164]Karagiannis T, Broido A, Faloutsos M, et al. Transport layer identification of P2P traffic. In:Proc. of the4th ACM SIGCOMM Conference on Internet Measurement. New York:ACM Press,2004,121-134
    [165]Karagiannis T, Papagiannaki K, Faloutsos M. BLINC:multilevel traffic classification in the dark. In:Proc. of ACM SIGCOMM. New York:ACM Press,2005,229-240
    [166]Haffner P, Sen S, Spatscheck O, et al. ACAS:Automated construction of application signatures. In:Proc. of the2005ACM SIGCOMM Workshop on Mining Network Data. New York:ACM Press,2005,197-202
    [167]Roughan M, Sen S, Spatscheck O, et al. Class-of-service mapping for QoS:A statistical signature-based approach to IP traffic classification. In:Proc. of the4th ACM SIGCOMM conference on Internet measurement. New York:ACM Press,2004,135-148
    [168]Li S, Liu J, Zhang Q. Research on H.323communications passing through NAT/Firewall. In:Proc. of6th International Conference on ITS Telecommunications Proceedings (ITST). Washington:IEEE Computer Society Press,2006,482-485
    [169]Basicevic I, Popovic M, Kukolj D. Comparison of SIP and H.323protocols. In:Proc. of the Third International Conference on Digital Telecommunications (ICDT). Washington:IEEE Computer Society Press,2008,162-167
    [170]Cao X, Hu R, Bian X, et al. A gatekeeper-based NAT traversal method for media transport in H.323network system. In:Proc. of International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). Washington:IEEE Computer Society Press,2005,1288-1291
    [171]Balik M, Cvrk L, Sykora M. Secure H.323data transmission between private networks. In:Proc. of Eighth International Conference on Networks (ICN). Washington:IEEE Computer Society Press,2009,248-252
    [172]Kamal R, Siddiqui M S, Hong C S. Solving interoperability problem of SIP, H.323and Jingle with a middleware. In:Proc. of13th International Conference on Advanced Communication Technology (ICACT). Washington:IEEE Computer Society Press,2011,1289-1292
    [173]Nlend S, Swart T G, Clarke W A. Optimization of resources for H.323endpoints and terminals over VoIP networks. In:Proc. of IEEE AFRICON. Washington:IEEE Computer Society Press,2011,1-5
    [174]Yin Y, Lu W, Zhang K. A videoconference system on the campus networks based on H.323protocol. In:Proc. of International Conference on Computational Science and Engineering (CSE). Washington:IEEE Computer Society Press,2009,1030-1033
    [175]Sun J, Zhu G, Xu D. Possibilities of voice resource DoS attacks based on H.323protocol in soft switch network. In:Proc. of International Conference on Multimedia Technology (ICMT). Washington:IEEE Computer Society Press,2010,1-4
    [176]Ansari S, Khan K N, Rehana J, et al. Different approaches of interworking between SIP and H.323. International Journal of Computer Science and Network Security,2009,9(3):232-239
    [177]Trivunovic B D, Popovic M V, Basicevic I V, et al. A design and implementation of ASN.1parser for H.323protocol stack. In:Proc. of8th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS). Washington: IEEE Computer Society Press,2007,60-63
    [178]Lu M, Lee P P C, Lui J S C. Identity attack and anonymity protection for P2P-VoD systems. In:Proc. of IEEE19th International Workshop on Quality of Service (IWQoS). Washington:IEEE Computer Society Press,2011,1-9
    [179]Luo W, Liu J, Xu J. An analysis of propagation and capability to attack of active P2P Worms. In:Proc. of3rd IEEE International Conference on Computer Science and Information Technology (ICC SIT). Washington:IEEE Computer Society Press,2010,506-509
    [180]Constantinou F, Mavrommatis P. Identifying known and unknown peer-to-peer traffic. In:Proc. of Fifth IEEE International Symposium on Network Computing and Applications (NCA). Washington:IEEE Computer Society Press,2006,93-102
    [181]Sawaya Y, Kubota A, Miyake Y. Detection of attackers in services using anomalous host behavior based on traffic flow statistics. In: Proc. of IEEE/IPSJ11th International Symposium on Applications and the Internet (SAINT). Washington:IEEE Computer Society Press,2011,353-359
    [182]Zhang J, Perdisci R, Lee W, et al. Detecting stealthy P2P botnets using statistical traffic fingerprints. In:Proc. of IEEE/IFIP41st International Conference on Dependable Systems&Networks (DSN). Washington:IEEE Computer Society Press,2011,121-132
    [183]Nguyen T T T, Armitage G. A survey of techniques for Internet traffic classification using machine learning. IEEE Communications Surveys and Tutorials,2008,10(4):56-76
    [184]Williams N, Zander S, Armitage G. A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification. ACM SIGCOMM Computer Communication Review,2006,36(5):5-16
    [185]Sen S, Spatscheck O, Wang D. Accurate, scalable in-network identification of p2p traffic using application signatures. In:Proc. of ACM WWW. New York:ACM Press,2004,512-521
    [186]Lai C F, Huang Y M, Chao H C. DLNA-based multimedia sharing system for OSGI framework with extension to P2P network. IEEE Systems Journal,2010,4(2):262-270
    [187]Yang Y, Liu C, Huang G. Feature research on unstructured P2P multicast video streaming. In:Proc. of2nd IEEE International Conference on Broadband Network&Multimedia Technology (IC-BNMT). Washington:IEEE Computer Society Press,2009,127-131

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700