54.161.157.73,您好!
查詢符號(半形) 查詢符號意義說明
空格 表示為「AND」兩個查詢詞之交集
雙引號 ( " " ) 片語以雙引號標示開始及結束,而且只尋找出現順序相同的字詞,例 : " image process "
? 表示一個字母切截,輸入兩個?表兩個字母,依此類推,例:輸入「Appl?」,查得結果應為appl e , appl y … ( 常用於英文字查詢 )
* 表示不限字母切截,由0~n. 例:輸入「appl*」,查得結果應為appl e , appl es , appl y , appl ied , appl ication … ( 常用於英文字查詢 )
AND、OR、NOT

布林邏輯組合關鍵字,用來擴大或縮小查詢範圍的技巧。
(1) AND :縮小查詢範圍
(2) OR :擴大查詢範圍 (3) NOT:排除不相關的範圍

close

DOI 是數位物件識別碼 ( D igital O bject I dentifier ) 的簡稱,
為物件在網路上的唯一識別碼,可用於永久連結並引用目標物件。

使用DOI作為永久連結

每個DOI號前面加上 「 http://dx.doi.org/ 」 便成為永久網址。
如以DOI號為 10.5297/ser.1201.002 的文獻為例,此文獻的永久連結便是: http://dx.doi.org/ 10.5297/ser.1201.002
日後不論出版單位如何更動此文獻位置,永久連結所指向的位置皆會即時更新,不再錯失重要的研究。

引用含有DOI的文獻

有DOI的文獻在引用時皆應同時引用DOI。若使用APA、Chicago以外未規範DOI的引用格式,可引用DOI永久連結。

DOI可強化引用精確性、增強學術圈連結,並給予使用者跨平台的良好使用經驗,目前在全世界已有超過五千萬個物件申請DOI。 如想對DOI的使用與概念有進一步了解,請參考 華藝DOI註冊中心doi.airiti.com ) 。

0 個人覺得 這篇文章 推薦
中文摘要 〈TOP〉
Abstract 〈TOP〉
參考文獻 ( 18 ) 〈TOP〉
  1. [12] S. Guha, P. Francis, “Characterization and Measurement of TCPTraversal through NATs and Firewalls,” in ACM Internet Measurement Conference (IMC), Berkeley, CA, Oct 2005, pp. 199-211.
    連結:
  2. [13] J. Postel, “DoD standard Transmission Control Protocol,” RFC 761, January 1980.
    連結:
  3. [15] H. Khlifi, Jean-Charles Gregoire and J. Phillips, “VoIP and NAT/Firewalls: Issues, Traversal Techniques, and a Real-World Solution,” IEEE Communication Magazine, July 2006, pp. 93-99.
    連結:
  4. [17] Cheng-Yuan Ho, Fu-Yu Wang, and Chien-Chao Tseng, “To Call or to Be Called under NATs is Sensitive for Solving Direct Connection Problem,” Technical Report, Dept. D-Link Joint NCTU Research Center, July 2009.
    連結:
  5. [1] K. Egevang and P. Francis, “The IP Network Address Translator (NAT),” IETF RFC 1631, March 1994.
  6. [2] J. Rosenberg, J. Weinberger, C. Huitema and R. Mahy, “STUN - simple traversal of user datagram protocol (UDP) through network address translators (NATs),” IETF RFC 3489, March 2003.
  7. [3] E. F. Audet and C. Jennings, “NAT Behavioral Requirements for Unicast UDP,” IETF RFC 4787, January 2007.
  8. [4] J. Rosenberg, R. Mahy, P. Matthews, and D. Wing, “Session Traversal Utilities for (NAT) (STUN),” IETF RFC 5389, October 2008.
  9. [5] J. Rosenberg, Interactive connectivity establishment (ICE), IETF Draft, October 2007.
  10. [6] B. Ford, P. Srisuresh and D. Kegel, “Peer-to-Peer Communication Across Network Address Translators,” in USENIX Annual Technical Conference, Anaheim, CA, April 2005, pp.179-192.
  11. [7] J. Rosenberg, C. Huitema, and R. Mahy, “Traversal using relay NAT (TURN),” IETF Draft, February 2009.
  12. [8] J. Rosenberg, TCP Candidates with Interactive Connectivity Establishment, IETF Draft, July 2008.
  13. [9] A. Biggadike, D. Ferullo, G. Wilson, and A. Perrig, “NATBLASTER: Establishing TCP connections between hosts behind NATs,” in ACM SIGCOMM Asia Workshop, Beijing, China, April 2005.
  14. [10] S. Guha, Yutaka Takeday, and P. Francis, “ NUTSS: A SIP-based approach to UDP and TCP network connectivity,” in ACM SIGCOMM Asia Workshops, August 2004.
  15. [11] Y. Takeda, “Symmetric NAT Traveral using STUN,” IETF draft, June 2003.
  16. [14] S. Guha, K. Biswas, B. Ford, S. Sivakumar, and P. Srisuresh, “NAT Behavioral Requirements for TCP,” IETF RFC5382, October 2008.
  17. [16] S. Perreault and J. Rosenberg, “Traversal Using Relays around NAT (TURN) Extensions for TCP Allocations,” IETF Draft, March 2009.
  18. [18] P. Srisuresh, B. Ford and D. Kegel, “State of Peer-to-Peer (P2P) Communication across Network Address Translators,” IETF RFC 5128, March 2008.
E-mail :
文章公開取用時,將寄通知信至您填寫的信箱地址
E-mail :

close

close