中国tianyaclub

tianyaclub  时间:2021-01-30  阅读:()
DynamicMonitoringModelforBBSContentSecurity*JingYu,YanpingZhaoSchoolofManagement&EconomicsBeijingInstituteofTechnologyBeijingP.
R.
Chinapaopaofish@bit.
edu.
cn,zhaoyp@bit.
edu.
cnAbstract:-BulletinBoardService(BBS)communityshouldbeaharmoniouspublicspeakinglocationfullofharmlessopinions.
ThispaperanalyzesthecharacteristicsofarticlecontentinBBS,especiallyforChineseLanguage,andproposesanoveldynamicmonitoringmodelforBBScontentsecurity.
Themodelisbasedonafastmulti-patternmatchingalgorithm,andusesacombinedapproachofTextFiltering,SocialNetworkAnalysis(SNA)andspotinvestigatingmethod.
Thesystemcandiscoverillegalarticleefficiently,andidentifydangerpersonsandthebehaviorpatterndynamically.
Key-Words:-BBS;Contentsecurity;Multi-patternmatch;SNA*ThisresearchissupportedbytheNationalNaturalScienceFoundationofChina(70471064),andResearchFoundationofBeijingInstituteofTechnology(BIT-UBF-200308G10).
1IntroductionTheoryresearchesandpracticeapplicationsaboutcontentsecurityfilteringmainlyaimatordinaryWWWtextsorEmail.
However,theexistingmethodsandtechnologiesarenotverysatisfactoryinviewofBBStexts.
Thereasonsasfollows:Firstly,thearticlecontentofBBSisdisplayedincisivelyandvividly,anduselargenumbersofshorteningsymbols,fabricatingtermswhichmakethetraditionalfilteringsystemscannotdistinguish.
Secondly,BBShasextremelyquickpublicrespondandspreadspeed,sothatithasdifficultyinmonitoringBBStimelyanddynamically.
Finally,sinceBBSiscomparativelyeasyforusersregisternewaccountsatanymoment,theanalystsareoverwhelmedwiththeincompleteormisleadinginformationfrommanysources,andhavedifficultyindiscoveringtheirrelations.
Thereisaneedtohelptheanalyststoidentifykeydangerpersonswhomaybehaveseveralvirtualaccounts,andtrackandanalyzerelationdataofthem.
ThispaperproposesaninnovativedynamicmonitoringmodelforBBScontentsecurity,whichusesacombinedapproachofTextFiltering,SocialNetworkAnalysis(SNA)andspotinvestigatingmethod,especiallyefficientforChinesenaturallanguage.
Thispaperisorganizedasfollows,insection2,somerelatedworks;section3proposestheframeworkofdynamicmonitoringmodelforBBScontentsecurity;section4,mainlydesignstwocoremodules,onesupportsContentFilterbasedonanovelfastMulti-Patternmatchingalgorithm,theothersupportsLinkAnalyzer;section5,someinitialtestresults;section6,conclusionsandfuturework.
2RelatedWorkRoughlytherearethreekindsofcontentsecurityfilteringtechnologies.
Thefirstiskeyword(s)matchingalgorithms.
ThesecondisstatisticalmethodbasedonVectorSpaceModel(VSM).
Thelastoneisbasedonknowledgebase.
Themostpopularoneissimplepattern(keyword)matchingbasedonSingle-PatternorMulti-Pattern.
Thespeedofpatternmatchingalgorithmisemphasizedinordertomeettheneedofbroadbandinformationfilteringonnetwork.
However,inthepracticalapplicationoffilteringsystem,twoexistingproblemsneedtobesolved.
TheyarehowtomaketherulesforfilteringcontentandwhichkindofpatternmatchingalgorithmismoreefficienttoChineselanguagetexts.
ThesecondfilteringtechnologyisstatisticalmethodbasedonVSM,whichiscomparativelyusedmoreintextclassificationresearchthaninothers.
Theaccuracyisenhancedgreatlythroughtrainingalargeamountofclearlyclassifiedcorpusandconstructingfeaturevector(keywords)torepresenteachclass.
Butthismethodconsumesmoretimeincomputingsimilaritybetweenfeaturevectorsandthatofunknowndocuments[1].
Thetwotechnologiesabove-mentionedhaveacommondisadvantageofnon-semantic.
Thecontentfilteringtechnologybasedonknowledgebaseisbecomingaresearchhotspotallovertheworld.
ThisresearchismoremeaningfultoChinesetextfilteringsinceitisbasedoncharactersetsnotwords.
JinYao-hongusesHierarchicalNetworkofConceptstheory(HNC)[2]andmatchingmethodbasedoncomplicatedChinesesemanticknowledgerules.
Itsaccuracyismorethan90%,butitsefficiencyiscomparativelyratherlow.
Wecanseespeedandaccuracyarebothimportanttothebroadbandnetworkcontentfiltering.
SoitisnecessarytoimprovetheexistingfilteringalgorithmtoadapttoChinesetextefficiently.
Someexpertsworkedonmixturedfilteringmethodresearch[3][4].
OthersapplySNAtechnologytoBBSresearch.
Forexample,VilleH.
Tuulosandetalcombinetopicmodelwithsocialnetworksforchatdatatopicmining[5].
KouZhong-baoandetaldiscoverthe"smallworld"phenomenonofBBS[6].
Buttherehasn'tbeenresearchaboutSNAappliedtoBBScontentsecuritymonitoring.
3FrameworkofDynamicMonitoringforBBSContentSecurity3.
1BBSDataSourceThedatausedinthispaperwascapturedfromTianyaClubBBS,whichisverypopularinP.
R.
China(www.
tianyaclub.
com).
ThetotalnumberofregisteredIDsisabout3,000,000andthenumberofliveusersisoftenover30,000.
SoTianyaClubprovidesaverygooddataresourceforourresearch.
Ingeneral,everyBBSismoreorlesscomposedofsomediscussiongroups(community).
Eachgrouphasaseriesofarticlesorganizedaccordingtodifferenttopics.
Thefirstarticleisinitialarticle.
Othersarereplyarticlesthatcommentsontheinitialone.
EacharticlecontainsaccountID,title,groupinformation,dateandtime,contents.
TheaccountIDofinitialarticleistheusernameofannouncer,whilethatofreplyarticleistheusernameofreplier.
SocialnetworkGemergesbecauseofthereplyrelationamongtheseaccountIDs.
EachaccountIDwhohastakenpartintopicdiscussionisanodevinG.
ThesetofvisV.
AlinkisestablishedbetweentwonodeswhenoneaccountIDrepliestotheother.
EachlinkeisanarcfromreplyIDtoinitialID.
ThesetofeisE.
AsocialnetworkinBBSisasmallworld[6].
3.
2DynamicMonitoringModelforBBSContentSecurityFig.
1presentstheframeworkofdynamicmonitoringmodelforBBScontentsecurity.
Fig.
1FrameworkofdynamicmonitoringmodelforBBScontentsecurity.
Thesystemisaimedatmonitoringterroristsordangerpersons'speechamongallLANuserswhoaccesstheBBSserver,suchasTianyaClub.
Thewholeframeworkincludesfourmodules.
(1)"CaptureandConvertData"moduleThismoduleisinchargeofcapturing,processingandconvertingBBSnetworkdataonthegatewayofLANwithfastdatapacketcaptureandprotocolanalysistechnology.
BasedonthecharacteristicofChineselanguage,the"plasmodium","synonym","meaningless"phenomenonexistsintheBBScontent.
Wegivedefinition1andexplanationhereandtheothersinthefollowingsections.
Definition1:"plasmodium"isaChineselanguagephenomenoninBBS.
Thereareafewofdeliberateinterferentialcharacters,suchas"*",writtenamongChinesecharactersbydangerpersonstoescapethefilteringsystem.
ItisbasedonnoticeablecharacterofChineselanguagedifferentfromEnglishlanguageisthatoneEnglishwordisusuallyequivalenttotwoorthreeChinesecharacters.
Forexample,thecombinationofcharacter"中"and"国"produces"中国"whichmeans"China".
Thiskindofphenomenondoesnotinfluencereaders'understanding,suchas"中*国"("中国"actually).
Butthenegativeinfluenceof"*"isthat"中*国"cannotbematchedbythepatternof"中国".
Sothedataneedtobecleanedoutthesedeliberateinterferentialcharactersafterconverting.
ThecleanedBBSdataisstoredas.
txtfilesintheappointedsitedirectories.
(2)"ExtractInformation"moduleUsefulinformationcontainedin.
txtfilesabove-mentionedisextractedandstoredintodatabase.
Thedataisdividedintotwokindsofinformationwewilldealwith.
Onekindis"title"and"content"thatarethedealingobjectsofContentFiltermodule.
Theotherischaracterinformation,suchas"accountID","data","time"etc.
thatarethedealingobjectsofLinkAnalysismodule.
(3)"ContentFilter"and"LinkAnalyzer"modules"ContentFilter"canmonitorarticlecontentandidentifywhetheranyfilteringruleismatched.
IfthereisaBBSarticlecontainingillegalcontent,therecordofthisspeakerismarkedwithdifferentlevel.
Then"LinkAnalyzer"makesajudgmentthatwhoistheauthoroftheillegalarticle(dangerpersons)andrecordshischaracters.
Alongwiththeexpansionofdangercommunitiesmatchedwithfilteringrules,"LinkAnalyzer"canhelptoanalyzethestatusoftheseaccountIDscharactersaccordingtosomeSNAparametervalues.
Moreover,VisualizationSoftwarecanhelpsimulatecommunitystructureanddiscoverpersons'relations,communitydistribution,informationspreadchannels,behaviorpatternsandinfluencepatterns.
Thefollowingsectionintroducesthesetwocoremodulesindetails.
4TwoCoreModules4.
1Thenovelfastmulti-patternmatchingalgorithmSpeedisveryimportantinsecurityfilteringapplication.
Asystemwithlowefficiencycannotperformwellinmonitoring.
MostpopularfastmatchingalgorithmsarebasedonMulti-pattern.
ThemostnotablealgorithmsincludeAho-Corasick(shortasAC)[12]andCommentz-Walter(shortasCW)[11]algorithms.
Astringisdefinedasapattern.
TheadvantageofMulti-patternmatchingalgorithmisthatalltheoccurrencesofanygivenstringscanbefoundonlyinoneprocessofscanningtext.
Thiskindofalgorithmshastwosteps.
Firstly,foragivensetofstrings,afinitestateautomaton(orwecallitpatterntree)isconstructed.
Andthen,thetextsteamisscannedfromendtoendwiththispatterntree.
Actually,patternmatchingisaprocessofstatetransition.
Eachstateisrepresentedbyanumber.
"0"representsstartstate.
Thereisanotherspecialstate,outputstate.
Whenanoutputstateisreceived,thecorrespondingstringisemitted.
WedenoteasetofstringsbyS,andintendtodetectalltheoccurrencesofanystringsinSinatextstreamT.
Patternmatchingisthatgivenacurrentstateandthenextinputcharacter,themachinecheckstoseeifthecharactercausesafailuretransition.
Ifnot,thenitmakesatransitiontothecorrespondingstateaccordingtothecharacter.
Incaseofafailuretransitionthemachinemustreconsiderthecharactercausingthefailureforthenexttransitionandthesameprocessisrepeatedrecursivelyuntilthegivencharacterleadstoanon-failureoutputstate.
Mostmulti-patternalgorithmsusetheshiftmethodofSingle-patternmatchingalgorithmBM[13],forexample,CW.
Whenapatterncharacterisnotmatchedbythenextinputcharacter,severaltextcharacterswouldbeskippedaccordingtoashiftvalue.
Inthisway,thematchingprocessbecomesmoreefficient.
WemadecomparisontosomearticlecontentsinChineselanguageandinEnglishlanguagewithCWalgorithm.
WediscoveredthatthetraditionalkeywordsmatchingalgorithmisnotsuitableforChineselanguage.
Thereasonsasfollows:(1)Fromfig.
2(b),eachEnglishwordiscomposedof26lettersfrom'a'to'z'.
Andthelengthofeachwordisabout5letters.
Butfromfig.
2(a)ordinaryChinesecharactersaremorethan3,000atleasttomakethebasicunitsofaword,andeachwordismadeofabouttwocharacters.
TheresultofthisdifferenceisthatChinesepatterntree(fig.
2(a))isfarwiderthanEnglishpatterntree(fig.
2(b)).
MuchmatchingtimeisconsumedinmatchingthefirstcharacterinChinesepatterntree.
Fig.
2(a)Chinesepatterntree.
Whereweuses1torepresentstring1:空军(airman)intheleftbranch,s2:飞机(airplane),s3:军队(army),s4:战争(battle),s5:前线(battlefront),s6:战场(battleground).
States:2,4,6,7,9,11representtheiroutputstates.
Fig.
2(b)Englishpatterntree.
Whereweuses1torepresentstring1:airman,intheleftbranch,s2:airplane,s3:army,s4:battle,s5:battlefront,s6:battleground.
States:6,11,14,20,26,32representtheiroutputstates.
(2)SinceanEnglishword(about5letters)islongerthanaChineseword(about2characters).
ItresultsthatChinesepatterntree(fig.
2(a))hasfewerdepths,notasmuchdeepasEnglishpatterntree(fig.
2(b)).
Andsincetheshiftvalueisdeterminedbyminimumpatternlength,Chinesewordsaretooshortandthesystemcannotsaverunningtimeinshiftstage.
OursolutionisthatallChinesecharacterscontainedinstringpatternsareorganizedaccordingtoeachcomputeduniquevalue,readintoaHashtable.
AteachnodeofHashtable,childHashtableissetdynamicallythroughcomputingthelattercharacterofthisnodeinonestring.
ThiskindoffiniteautomatonisbasedonHash.
(Seefig.
3)Fig.
3Newstringpatterntreebasedonfastmulti-patternmatchingalgorithm.
Ifastringiscomposedofthreecharacters,depth3childhashtablecanbesetdynamically.
4.
2FilteringrulesbasedonpatternThenextproblemishowtomakefilteringrules.
WeusestatisticalmethodbasedonVSM.
Themodelmapseachdocumenttoasetofnormalizedtermsasavector,whichisexpressedas(T1,W1;T2,W2;…,Tn,Wn),whereTiisafeatureterm,WiistheweightforTi.
ThetraditionalTF-IDF[14]weights:∑=++*=niikiikiikNNttfNNttft122)05.
0(log)()05.
0log()()(ω(1)Thefilteringruleswemadeshouldhaverepresentationanddiscrimination.
Thatisfeaturetermsmustrepresentthecontentofthetargetandcandiscriminateaclassofdocumentsfromothers.
ThetraditionalTF-IDFonlycancomputetheweightofaterminoneclass,butcannotdiscriminatethedifferenceofitsweightinseveralclasses.
Therefore,themodifiedTF-IDFweightsaredefinedasfollows:)1()05.
0(log)()05.
0log()()(122DCDAniikiikiikDIDINNttfNNttft**++*=∑=ω(2)DIDA(DistributionInformationamongClasses)andDIDC(DistributionInformationinsideaClass)aretwoimpactfactors.
DIDArepresentsthedistributiondifferenceoffeaturetermsamongkindsofclasses.
DIDCrepresentsthedistributiondifferenceoffeaturetermsinthesameclass.
DIDAandDIDCaredefinedasfollows:)()1())()((12kmikkiDAttfmttfttfDI=∑=(3)∑==mikikttfmttf1)(1)(Wheretfi(tk)representsthefrequencyoffeaturetermtkinclassi,mrepresentsthenumberofclasses.
Whenafeaturetermtkonlyappearsinaclass,DIDA=1anditdiscriminatesclassstrongly.
Whenthefrequencyoftkineachclassisequal,DIDA=0anditcanhardlydiscriminatesclass.
)()1())()(('12'knjkkjDCttfnttfttfDI=∑=(4)∑==njkjkttfnttf1')(1)(Wheretfj(tk)representsthefrequencyoffeaturetermtkindocumentj,nrepresentsthenumberofdocumentsinoneclass.
Whenafeaturetermtkonlyappearsinadocumentofaclass,DIDA=1anditcanhardlydiscriminatesclass.
Thisdocumentislikelytobeanexceptionofthisclass.
Whenthefrequencyoftkineachdocumentofaclassisequal,DIDA=0,itdiscriminatesclassstrongly.
ThesystemcomputestheweightsoffeaturetermsaccordingtothemodifiedTF-IDFandselectsthosetermswiththeirweightsbiggerthanathreshold.
Andmaketheselectedtermsaspatternsinthepatterntree.
Thiskindofpatternalsocanbeaddedandmodifiedmanually.
Besides,wehavespecialtreatmentforsynonymandmeaninglesswords.
Theirdefinitionsareasfollows:Definition2,synonymmeansthemeaningofonewordissimilartoanother,oradialect,oranirregularwordtorepresentameaningfulword.
Wesetonedelegatewordforasynonymlist.
Thesystemevaluatestheweightofeachwordinthislistequaltothatofdelegate.
Forexample,adelegate"弟弟妹妹"(brothersandsisters)alwaysreplacesitsshorteningsymbolsandfabricatingterms"ddmm"inthelist.
Definition3,meaninglesswords,themeaningofthesewordshasnotenoughdiscriminationamongclasses.
Someofthemneedtobeidentifiedandpickedout.
Administratorcanaddormodifythemintoastopwordlist.
4.
3LinkAnalyzerSocialnetworkanalysistheoryhasmanymeaningfulparameters[7][8],whichcanexplainsomesocialproblemsincommunityenvironment.
WeusetheseparameterstodiscoverimportantinformationfromBBScharacterrelationdata.
TheparametersasDegree,Closeness,BetweennesscandisclosethestatusofdangerpersonsinBBS,andparametersasCharacteristicpathlength,Clustercoefficientdisclosethedensedegreeofcommunityandinformationspreadspeedwithincommunity.
Degreerepresentsthenumberofedgesconnectedwithnodev.
Indegreerepresentsthenumberofreplyfromothernodestonodev.
Outdegreerepresentsthenumberofreplyfromnodevtoothernode.
ThethreeparametersevaluatethedifferenceofcorestatusamongdangeraccountIDs.
Theyaredefined:maxdeg)deg()(vvd=(5)maxdeg)deg()(invinvdin=(6)maxdeg)deg()(outvoutvdout=(7)Itholds0≤d(v),din(v),dout(v)≤1,degmax,indegmaxandoutdegmaxarethemaximumvalueofDegree,IndegreeandOutdegreerespectively.
ClosenessweighstheadjacencydegreebetweennodevandothernodesuV.
Itisdefined:∈),(1)(uvdnvclVu∈Σ=(8)Wherenrepresentsthenumberofnodes,d(v,u)representstheshortestpathlengthfromnodevtonodeuV.
Itholds0≤∈cl(v)≤1.
Betweennessrepresentsthedependingdegreeonnodevfromnodeu∈VtoothernodeszV.
Itis∈defined:∑≠≠≠≠∈=zvuvzuzunVzuzunvzunnnvbw,,0),(;,),();,()2)(1(1)((9)Wheren(u,z)isthenumberofgeodesicsfromutozandn(u,z;v)isthenumberofgeodesicsfromutozpassingthroughv.
Itholds0≤bw(v)≤1.
Characteristicpathlengthrepresentstheaverageshortestpathlengthofn(n-1)/2pairofnodes.
Itisdefined:2/)1(),(,=∑nnuvdLuv(10)ClustercoefficientistheaverageofallnodesCv.
Cvisdefined:2/)1()(ΓΕ=vvvvkkC(11)Where)deg(vkv=,)(vΓΕrepresentstheedgesthattheneighborsofnodevconnecteachother.
Wecanobtainthedynamiccharacteristicsofdangeroussocialnetwork,anddiscovernewbehaviourpatternsthroughobservingandcomparingthechangeofparametervaluesindifferenttime.
Weusetheequationsumexpressionasfollows:2112))()((tptppmiii∑==(12)Wheremrepresentsthenumberofparameters,t1andt2representtwodifferenttimes,pi(t)representsthevalueofparameteriattimet.
Ifthevalueofpisbiggerthanthreshold,thereisanotablepatternvariance.
Thesystemneedtomonitorandanalyzeagain.
5InitialTestingResultsThefollowfiguresandtablesaresometestresults.
Inthefigures,The33accountIDsarefilteredoutbecausethecontentoftheirarticlesismatchedbythefilteringrulesofmilitaryaffairsclass.
Theydiscussedaroundthistopic.
Weusespotinvestigatingmethodstotracksomevitallinkclues.
Thismethodcontainsthreestepsasfollows:StepOne:GeneralInvestigationWeconsiderallaccountIDsasawhole.
Infig.
4thereareseveralcliquesinthiscommunity.
Thecentralkeypersonsofcliquesareobvious.
ID1andID7havebiggernodesanddeepercolor.
AndthearticlesfromID18,ID19,ID20andID21cannotarouseotherpersons'interest.
WecanidentifyeachIDcharacter'sstatusthroughcomputingSNAparametervalues.
(Seetab.
1)Fig.
4Generalinvestigation.
Tab.
1TopthreeaccountIDswithmaximumparametervalues.
ThistablerepresentsthetopthreekeyaccountIDsaccordingtothemaximumparametervalues.
WefindID1andID7havehighercentralityandareconsideredasleaders.
StepTwo:PartitionInvestigationWeneedtopaymoreattentiontothetwoleadersID1andID7.
ThepartitiongroupwecaredalsoincludestheaccountIDswhichhaverelationtoeitherID1orID7.
(Seefig.
5)Fig.
5.
Partitioninvestigation.
Wecanfindanimportantrolethatmaybeignoredinstep1.
HeisID10.
HenotonlyrepliedID1,butalsorepliedID7.
AlthoughhehasnothighcentralityasID1andID7,hemaybetheinformationsource.
StepThree:IndividualInvestigationWeshouldemphasisoninvestigatingthekeypersonsandtheirrepliers.
Wecanfindmoreneighborhoodinformationandclues.
Fig.
6.
Individualinvestigation.
Infig.
6,nineaccountIDsrepliedID1exceptID4.
ID1repliedID4unexpectedly.
WesupposethatanothercliquewillcomeuparoundID4.
6ConclusionsandFutureWorkThispaperintroducestheBBScontentsecurityframeworkroughly.
ThedynamicmonitoringmodelusesacombinedapproachofTextFiltering,SocialNetworkAnalysis(SNA)andspotinvestigatingmethod.
Inthecontentfiltering,anovelfastmulti-patternmatchingalgorithmisproposedandmoreefficientforChineselanguageespecially.
Inordertoimprovetheeffectofcontentfiltering,wedesigntoaddasemanticfunctioninthecontentfiltermodulebasedonknowledgerules.
Besides,moreBBSdataminingworkneedtodowithSNAtheory.
References:[1]HeJing,LiuHai-yan,Real-timeContentFilteringBasedonVectorSpaceModel,ComputerEngineering,Vol.
30,No.
15,2004,8,pp.
26-27.
[2]JinYao-hong,DesignandImplementationofSemantic-basedTextFilteringSystem,ComputerEngineeringandApplication,No.
17,2003,pp.
22-25.
[3]SUGui-yang,LIJian-hua,MAYing-hua,etal,Improvingtheprecisionofthekeyword-matchingpornographictextfilteringmethodusingahybridmodel,JournalofZhejiangUniversitySCIENCE,Vol.
5,No.
9,2004,pp.
1106-1113.
[4]LiuChang-yu,TangChang-jie,YuZhong-hua,BayesDiscriminatorforBBSDocumentBasedonLatentSemanticAnalysis,ChineseJournalofComputers,Vol.
27,No.
4,2004,pp.
566-572.
[5]VilleH.
Tuulos,HenryTirri,Combiningtopicmodelsandsocialnetworksforchatdatamining,Proceedings-IEEE/WIC/ACMInternationalConferenceonWebIntelligence,WI2004,2004,pp.
206-213.
[6]KouZhong-bao,ZhangChang-shui,Replynetworksonabulletinboardsystem,PhysicalReviewE(Statistical,Nonlinear,andSoftMatterPhysics),Vol.
67,No.
3,March,2003,pp.
36117-1-6.
[7]PetterHolme,CharacteristicsofSmallWorldNetworks,http://www.
tp.
umu.
se/_kim/Network/holme1.
pdf,20th,April,2001.
[8]D.
J.
Watts,S.
H.
Strogatz,CollectiveDynamicsof`Small-World'Networks,Nature,1998,pp.
393-440.
[9]Commentz-WalterB,Astring-matchingalgorithmfastontheaverage,Proc6thInternationalColloquiumonAutomataLanguagesandProgramming,1979,pp.
118-132.
[10]AhoAV,CorasickMJ,Efficientstringmatching:anaidtobibliographicsearch,CommunicationsoftheACM,No.
18,1975,pp.
333-340.
[11]BoyerRS,MooreJS,Afaststring-searchingalgorithm,CommunicationsoftheACM,No.
20,1977,pp.
762-772.
[12]Salton,G.
(Ed.
),AutomaticTextProcessing.
AddisonWesley,Massachusetts,1989.

舍利云:海外云服务器,6核16G超大带宽vps;支持全球范围,原价516,折后价200元/月!

舍利云怎么样?舍利云推出了6核16G超大带宽316G高性能SSD和CPU,支持全球范围,原价516,折后价200元一月。原价80美元,现价30美元,支持地区:日本,新加坡,荷兰,法国,英国,澳大利亚,加拿大,韩国,美国纽约,美国硅谷,美国洛杉矶,美国亚特兰大,美国迈阿密州,美国西雅图,美国芝加哥,美国达拉斯。舍利云是vps云服务器的销售商家,其产品主要的特色是适合seo和建站,性价比方面非常不错,...

RAKsmartCloud服务器,可自定义配置月$7.59

RAKsmart商家一直以来在独立服务器、站群服务器和G口和10G口大端口流量服务器上下功夫比较大,但是在VPS主机业务上仅仅是顺带,尤其是我们看到大部分主流商家都做云服务器,而RAKsmart商家终于开始做云服务器,这次试探性的新增美国硅谷机房一个方案。月付7.59美元起,支持自定义配置,KVM虚拟化,美国硅谷机房,VPC网络/经典网络,大陆优化/精品网线路,支持Linux或者Windows操作...

美国VPS 美国高防VPS 香港VPS 日本VPS 首月9元 百纵科技

百纵科技湖南百纵科技有限公司是一家具有ISP ICP 电信增值许可证的正规公司,多年不断转型探索现已颇具规模,公司成立于2009年 通过多年经营积累目前已独具一格,公司主要经营香港服务器,香港站群服务器,美国高防服务器,美国站群服务器,云服务器,母机租用托管!美国CN2云服务器,美国VPS,美国高防云主机,美国独立服务器,美国站群服务器,美国母机。美国原生IP支持大批量订货 合作 适用电商 亚马逊...

tianyaclub为你推荐
音乐播放器哪个好音乐播放器哪个最好用速腾和朗逸哪个好大众速腾和朗逸哪个比较好?家用!红茶和绿茶哪个好红茶和绿茶,哪个好?美国国际集团美国AIG股票,值得长远投资吗??空间登录器qq空间登录不了怎么办q空间登录QQ空间经常提示要登录?yy空间登录怎样进入YY主播的空间willyunlee找一部关于摩托车的电影`东莞电信网上营业厅东莞虎门电信营业厅360云盘怎么用360云盘怎么运用和有什么用法
网络域名 美国vps 备案域名出售 中国万网域名 virpus 电影服务器 ix主机 seovip hnyd 河南服务器 ibox官网 有益网络 服务器维护方案 hdd 万网空间购买 shopex主机 江苏双线服务器 linode支付宝 群英网络 空间服务器 更多