中国tianyaclub

tianyaclub  时间:2021-01-30  阅读:()
DynamicMonitoringModelforBBSContentSecurity*JingYu,YanpingZhaoSchoolofManagement&EconomicsBeijingInstituteofTechnologyBeijingP.
R.
Chinapaopaofish@bit.
edu.
cn,zhaoyp@bit.
edu.
cnAbstract:-BulletinBoardService(BBS)communityshouldbeaharmoniouspublicspeakinglocationfullofharmlessopinions.
ThispaperanalyzesthecharacteristicsofarticlecontentinBBS,especiallyforChineseLanguage,andproposesanoveldynamicmonitoringmodelforBBScontentsecurity.
Themodelisbasedonafastmulti-patternmatchingalgorithm,andusesacombinedapproachofTextFiltering,SocialNetworkAnalysis(SNA)andspotinvestigatingmethod.
Thesystemcandiscoverillegalarticleefficiently,andidentifydangerpersonsandthebehaviorpatterndynamically.
Key-Words:-BBS;Contentsecurity;Multi-patternmatch;SNA*ThisresearchissupportedbytheNationalNaturalScienceFoundationofChina(70471064),andResearchFoundationofBeijingInstituteofTechnology(BIT-UBF-200308G10).
1IntroductionTheoryresearchesandpracticeapplicationsaboutcontentsecurityfilteringmainlyaimatordinaryWWWtextsorEmail.
However,theexistingmethodsandtechnologiesarenotverysatisfactoryinviewofBBStexts.
Thereasonsasfollows:Firstly,thearticlecontentofBBSisdisplayedincisivelyandvividly,anduselargenumbersofshorteningsymbols,fabricatingtermswhichmakethetraditionalfilteringsystemscannotdistinguish.
Secondly,BBShasextremelyquickpublicrespondandspreadspeed,sothatithasdifficultyinmonitoringBBStimelyanddynamically.
Finally,sinceBBSiscomparativelyeasyforusersregisternewaccountsatanymoment,theanalystsareoverwhelmedwiththeincompleteormisleadinginformationfrommanysources,andhavedifficultyindiscoveringtheirrelations.
Thereisaneedtohelptheanalyststoidentifykeydangerpersonswhomaybehaveseveralvirtualaccounts,andtrackandanalyzerelationdataofthem.
ThispaperproposesaninnovativedynamicmonitoringmodelforBBScontentsecurity,whichusesacombinedapproachofTextFiltering,SocialNetworkAnalysis(SNA)andspotinvestigatingmethod,especiallyefficientforChinesenaturallanguage.
Thispaperisorganizedasfollows,insection2,somerelatedworks;section3proposestheframeworkofdynamicmonitoringmodelforBBScontentsecurity;section4,mainlydesignstwocoremodules,onesupportsContentFilterbasedonanovelfastMulti-Patternmatchingalgorithm,theothersupportsLinkAnalyzer;section5,someinitialtestresults;section6,conclusionsandfuturework.
2RelatedWorkRoughlytherearethreekindsofcontentsecurityfilteringtechnologies.
Thefirstiskeyword(s)matchingalgorithms.
ThesecondisstatisticalmethodbasedonVectorSpaceModel(VSM).
Thelastoneisbasedonknowledgebase.
Themostpopularoneissimplepattern(keyword)matchingbasedonSingle-PatternorMulti-Pattern.
Thespeedofpatternmatchingalgorithmisemphasizedinordertomeettheneedofbroadbandinformationfilteringonnetwork.
However,inthepracticalapplicationoffilteringsystem,twoexistingproblemsneedtobesolved.
TheyarehowtomaketherulesforfilteringcontentandwhichkindofpatternmatchingalgorithmismoreefficienttoChineselanguagetexts.
ThesecondfilteringtechnologyisstatisticalmethodbasedonVSM,whichiscomparativelyusedmoreintextclassificationresearchthaninothers.
Theaccuracyisenhancedgreatlythroughtrainingalargeamountofclearlyclassifiedcorpusandconstructingfeaturevector(keywords)torepresenteachclass.
Butthismethodconsumesmoretimeincomputingsimilaritybetweenfeaturevectorsandthatofunknowndocuments[1].
Thetwotechnologiesabove-mentionedhaveacommondisadvantageofnon-semantic.
Thecontentfilteringtechnologybasedonknowledgebaseisbecomingaresearchhotspotallovertheworld.
ThisresearchismoremeaningfultoChinesetextfilteringsinceitisbasedoncharactersetsnotwords.
JinYao-hongusesHierarchicalNetworkofConceptstheory(HNC)[2]andmatchingmethodbasedoncomplicatedChinesesemanticknowledgerules.
Itsaccuracyismorethan90%,butitsefficiencyiscomparativelyratherlow.
Wecanseespeedandaccuracyarebothimportanttothebroadbandnetworkcontentfiltering.
SoitisnecessarytoimprovetheexistingfilteringalgorithmtoadapttoChinesetextefficiently.
Someexpertsworkedonmixturedfilteringmethodresearch[3][4].
OthersapplySNAtechnologytoBBSresearch.
Forexample,VilleH.
Tuulosandetalcombinetopicmodelwithsocialnetworksforchatdatatopicmining[5].
KouZhong-baoandetaldiscoverthe"smallworld"phenomenonofBBS[6].
Buttherehasn'tbeenresearchaboutSNAappliedtoBBScontentsecuritymonitoring.
3FrameworkofDynamicMonitoringforBBSContentSecurity3.
1BBSDataSourceThedatausedinthispaperwascapturedfromTianyaClubBBS,whichisverypopularinP.
R.
China(www.
tianyaclub.
com).
ThetotalnumberofregisteredIDsisabout3,000,000andthenumberofliveusersisoftenover30,000.
SoTianyaClubprovidesaverygooddataresourceforourresearch.
Ingeneral,everyBBSismoreorlesscomposedofsomediscussiongroups(community).
Eachgrouphasaseriesofarticlesorganizedaccordingtodifferenttopics.
Thefirstarticleisinitialarticle.
Othersarereplyarticlesthatcommentsontheinitialone.
EacharticlecontainsaccountID,title,groupinformation,dateandtime,contents.
TheaccountIDofinitialarticleistheusernameofannouncer,whilethatofreplyarticleistheusernameofreplier.
SocialnetworkGemergesbecauseofthereplyrelationamongtheseaccountIDs.
EachaccountIDwhohastakenpartintopicdiscussionisanodevinG.
ThesetofvisV.
AlinkisestablishedbetweentwonodeswhenoneaccountIDrepliestotheother.
EachlinkeisanarcfromreplyIDtoinitialID.
ThesetofeisE.
AsocialnetworkinBBSisasmallworld[6].
3.
2DynamicMonitoringModelforBBSContentSecurityFig.
1presentstheframeworkofdynamicmonitoringmodelforBBScontentsecurity.
Fig.
1FrameworkofdynamicmonitoringmodelforBBScontentsecurity.
Thesystemisaimedatmonitoringterroristsordangerpersons'speechamongallLANuserswhoaccesstheBBSserver,suchasTianyaClub.
Thewholeframeworkincludesfourmodules.
(1)"CaptureandConvertData"moduleThismoduleisinchargeofcapturing,processingandconvertingBBSnetworkdataonthegatewayofLANwithfastdatapacketcaptureandprotocolanalysistechnology.
BasedonthecharacteristicofChineselanguage,the"plasmodium","synonym","meaningless"phenomenonexistsintheBBScontent.
Wegivedefinition1andexplanationhereandtheothersinthefollowingsections.
Definition1:"plasmodium"isaChineselanguagephenomenoninBBS.
Thereareafewofdeliberateinterferentialcharacters,suchas"*",writtenamongChinesecharactersbydangerpersonstoescapethefilteringsystem.
ItisbasedonnoticeablecharacterofChineselanguagedifferentfromEnglishlanguageisthatoneEnglishwordisusuallyequivalenttotwoorthreeChinesecharacters.
Forexample,thecombinationofcharacter"中"and"国"produces"中国"whichmeans"China".
Thiskindofphenomenondoesnotinfluencereaders'understanding,suchas"中*国"("中国"actually).
Butthenegativeinfluenceof"*"isthat"中*国"cannotbematchedbythepatternof"中国".
Sothedataneedtobecleanedoutthesedeliberateinterferentialcharactersafterconverting.
ThecleanedBBSdataisstoredas.
txtfilesintheappointedsitedirectories.
(2)"ExtractInformation"moduleUsefulinformationcontainedin.
txtfilesabove-mentionedisextractedandstoredintodatabase.
Thedataisdividedintotwokindsofinformationwewilldealwith.
Onekindis"title"and"content"thatarethedealingobjectsofContentFiltermodule.
Theotherischaracterinformation,suchas"accountID","data","time"etc.
thatarethedealingobjectsofLinkAnalysismodule.
(3)"ContentFilter"and"LinkAnalyzer"modules"ContentFilter"canmonitorarticlecontentandidentifywhetheranyfilteringruleismatched.
IfthereisaBBSarticlecontainingillegalcontent,therecordofthisspeakerismarkedwithdifferentlevel.
Then"LinkAnalyzer"makesajudgmentthatwhoistheauthoroftheillegalarticle(dangerpersons)andrecordshischaracters.
Alongwiththeexpansionofdangercommunitiesmatchedwithfilteringrules,"LinkAnalyzer"canhelptoanalyzethestatusoftheseaccountIDscharactersaccordingtosomeSNAparametervalues.
Moreover,VisualizationSoftwarecanhelpsimulatecommunitystructureanddiscoverpersons'relations,communitydistribution,informationspreadchannels,behaviorpatternsandinfluencepatterns.
Thefollowingsectionintroducesthesetwocoremodulesindetails.
4TwoCoreModules4.
1Thenovelfastmulti-patternmatchingalgorithmSpeedisveryimportantinsecurityfilteringapplication.
Asystemwithlowefficiencycannotperformwellinmonitoring.
MostpopularfastmatchingalgorithmsarebasedonMulti-pattern.
ThemostnotablealgorithmsincludeAho-Corasick(shortasAC)[12]andCommentz-Walter(shortasCW)[11]algorithms.
Astringisdefinedasapattern.
TheadvantageofMulti-patternmatchingalgorithmisthatalltheoccurrencesofanygivenstringscanbefoundonlyinoneprocessofscanningtext.
Thiskindofalgorithmshastwosteps.
Firstly,foragivensetofstrings,afinitestateautomaton(orwecallitpatterntree)isconstructed.
Andthen,thetextsteamisscannedfromendtoendwiththispatterntree.
Actually,patternmatchingisaprocessofstatetransition.
Eachstateisrepresentedbyanumber.
"0"representsstartstate.
Thereisanotherspecialstate,outputstate.
Whenanoutputstateisreceived,thecorrespondingstringisemitted.
WedenoteasetofstringsbyS,andintendtodetectalltheoccurrencesofanystringsinSinatextstreamT.
Patternmatchingisthatgivenacurrentstateandthenextinputcharacter,themachinecheckstoseeifthecharactercausesafailuretransition.
Ifnot,thenitmakesatransitiontothecorrespondingstateaccordingtothecharacter.
Incaseofafailuretransitionthemachinemustreconsiderthecharactercausingthefailureforthenexttransitionandthesameprocessisrepeatedrecursivelyuntilthegivencharacterleadstoanon-failureoutputstate.
Mostmulti-patternalgorithmsusetheshiftmethodofSingle-patternmatchingalgorithmBM[13],forexample,CW.
Whenapatterncharacterisnotmatchedbythenextinputcharacter,severaltextcharacterswouldbeskippedaccordingtoashiftvalue.
Inthisway,thematchingprocessbecomesmoreefficient.
WemadecomparisontosomearticlecontentsinChineselanguageandinEnglishlanguagewithCWalgorithm.
WediscoveredthatthetraditionalkeywordsmatchingalgorithmisnotsuitableforChineselanguage.
Thereasonsasfollows:(1)Fromfig.
2(b),eachEnglishwordiscomposedof26lettersfrom'a'to'z'.
Andthelengthofeachwordisabout5letters.
Butfromfig.
2(a)ordinaryChinesecharactersaremorethan3,000atleasttomakethebasicunitsofaword,andeachwordismadeofabouttwocharacters.
TheresultofthisdifferenceisthatChinesepatterntree(fig.
2(a))isfarwiderthanEnglishpatterntree(fig.
2(b)).
MuchmatchingtimeisconsumedinmatchingthefirstcharacterinChinesepatterntree.
Fig.
2(a)Chinesepatterntree.
Whereweuses1torepresentstring1:空军(airman)intheleftbranch,s2:飞机(airplane),s3:军队(army),s4:战争(battle),s5:前线(battlefront),s6:战场(battleground).
States:2,4,6,7,9,11representtheiroutputstates.
Fig.
2(b)Englishpatterntree.
Whereweuses1torepresentstring1:airman,intheleftbranch,s2:airplane,s3:army,s4:battle,s5:battlefront,s6:battleground.
States:6,11,14,20,26,32representtheiroutputstates.
(2)SinceanEnglishword(about5letters)islongerthanaChineseword(about2characters).
ItresultsthatChinesepatterntree(fig.
2(a))hasfewerdepths,notasmuchdeepasEnglishpatterntree(fig.
2(b)).
Andsincetheshiftvalueisdeterminedbyminimumpatternlength,Chinesewordsaretooshortandthesystemcannotsaverunningtimeinshiftstage.
OursolutionisthatallChinesecharacterscontainedinstringpatternsareorganizedaccordingtoeachcomputeduniquevalue,readintoaHashtable.
AteachnodeofHashtable,childHashtableissetdynamicallythroughcomputingthelattercharacterofthisnodeinonestring.
ThiskindoffiniteautomatonisbasedonHash.
(Seefig.
3)Fig.
3Newstringpatterntreebasedonfastmulti-patternmatchingalgorithm.
Ifastringiscomposedofthreecharacters,depth3childhashtablecanbesetdynamically.
4.
2FilteringrulesbasedonpatternThenextproblemishowtomakefilteringrules.
WeusestatisticalmethodbasedonVSM.
Themodelmapseachdocumenttoasetofnormalizedtermsasavector,whichisexpressedas(T1,W1;T2,W2;…,Tn,Wn),whereTiisafeatureterm,WiistheweightforTi.
ThetraditionalTF-IDF[14]weights:∑=++*=niikiikiikNNttfNNttft122)05.
0(log)()05.
0log()()(ω(1)Thefilteringruleswemadeshouldhaverepresentationanddiscrimination.
Thatisfeaturetermsmustrepresentthecontentofthetargetandcandiscriminateaclassofdocumentsfromothers.
ThetraditionalTF-IDFonlycancomputetheweightofaterminoneclass,butcannotdiscriminatethedifferenceofitsweightinseveralclasses.
Therefore,themodifiedTF-IDFweightsaredefinedasfollows:)1()05.
0(log)()05.
0log()()(122DCDAniikiikiikDIDINNttfNNttft**++*=∑=ω(2)DIDA(DistributionInformationamongClasses)andDIDC(DistributionInformationinsideaClass)aretwoimpactfactors.
DIDArepresentsthedistributiondifferenceoffeaturetermsamongkindsofclasses.
DIDCrepresentsthedistributiondifferenceoffeaturetermsinthesameclass.
DIDAandDIDCaredefinedasfollows:)()1())()((12kmikkiDAttfmttfttfDI=∑=(3)∑==mikikttfmttf1)(1)(Wheretfi(tk)representsthefrequencyoffeaturetermtkinclassi,mrepresentsthenumberofclasses.
Whenafeaturetermtkonlyappearsinaclass,DIDA=1anditdiscriminatesclassstrongly.
Whenthefrequencyoftkineachclassisequal,DIDA=0anditcanhardlydiscriminatesclass.
)()1())()(('12'knjkkjDCttfnttfttfDI=∑=(4)∑==njkjkttfnttf1')(1)(Wheretfj(tk)representsthefrequencyoffeaturetermtkindocumentj,nrepresentsthenumberofdocumentsinoneclass.
Whenafeaturetermtkonlyappearsinadocumentofaclass,DIDA=1anditcanhardlydiscriminatesclass.
Thisdocumentislikelytobeanexceptionofthisclass.
Whenthefrequencyoftkineachdocumentofaclassisequal,DIDA=0,itdiscriminatesclassstrongly.
ThesystemcomputestheweightsoffeaturetermsaccordingtothemodifiedTF-IDFandselectsthosetermswiththeirweightsbiggerthanathreshold.
Andmaketheselectedtermsaspatternsinthepatterntree.
Thiskindofpatternalsocanbeaddedandmodifiedmanually.
Besides,wehavespecialtreatmentforsynonymandmeaninglesswords.
Theirdefinitionsareasfollows:Definition2,synonymmeansthemeaningofonewordissimilartoanother,oradialect,oranirregularwordtorepresentameaningfulword.
Wesetonedelegatewordforasynonymlist.
Thesystemevaluatestheweightofeachwordinthislistequaltothatofdelegate.
Forexample,adelegate"弟弟妹妹"(brothersandsisters)alwaysreplacesitsshorteningsymbolsandfabricatingterms"ddmm"inthelist.
Definition3,meaninglesswords,themeaningofthesewordshasnotenoughdiscriminationamongclasses.
Someofthemneedtobeidentifiedandpickedout.
Administratorcanaddormodifythemintoastopwordlist.
4.
3LinkAnalyzerSocialnetworkanalysistheoryhasmanymeaningfulparameters[7][8],whichcanexplainsomesocialproblemsincommunityenvironment.
WeusetheseparameterstodiscoverimportantinformationfromBBScharacterrelationdata.
TheparametersasDegree,Closeness,BetweennesscandisclosethestatusofdangerpersonsinBBS,andparametersasCharacteristicpathlength,Clustercoefficientdisclosethedensedegreeofcommunityandinformationspreadspeedwithincommunity.
Degreerepresentsthenumberofedgesconnectedwithnodev.
Indegreerepresentsthenumberofreplyfromothernodestonodev.
Outdegreerepresentsthenumberofreplyfromnodevtoothernode.
ThethreeparametersevaluatethedifferenceofcorestatusamongdangeraccountIDs.
Theyaredefined:maxdeg)deg()(vvd=(5)maxdeg)deg()(invinvdin=(6)maxdeg)deg()(outvoutvdout=(7)Itholds0≤d(v),din(v),dout(v)≤1,degmax,indegmaxandoutdegmaxarethemaximumvalueofDegree,IndegreeandOutdegreerespectively.
ClosenessweighstheadjacencydegreebetweennodevandothernodesuV.
Itisdefined:∈),(1)(uvdnvclVu∈Σ=(8)Wherenrepresentsthenumberofnodes,d(v,u)representstheshortestpathlengthfromnodevtonodeuV.
Itholds0≤∈cl(v)≤1.
Betweennessrepresentsthedependingdegreeonnodevfromnodeu∈VtoothernodeszV.
Itis∈defined:∑≠≠≠≠∈=zvuvzuzunVzuzunvzunnnvbw,,0),(;,),();,()2)(1(1)((9)Wheren(u,z)isthenumberofgeodesicsfromutozandn(u,z;v)isthenumberofgeodesicsfromutozpassingthroughv.
Itholds0≤bw(v)≤1.
Characteristicpathlengthrepresentstheaverageshortestpathlengthofn(n-1)/2pairofnodes.
Itisdefined:2/)1(),(,=∑nnuvdLuv(10)ClustercoefficientistheaverageofallnodesCv.
Cvisdefined:2/)1()(ΓΕ=vvvvkkC(11)Where)deg(vkv=,)(vΓΕrepresentstheedgesthattheneighborsofnodevconnecteachother.
Wecanobtainthedynamiccharacteristicsofdangeroussocialnetwork,anddiscovernewbehaviourpatternsthroughobservingandcomparingthechangeofparametervaluesindifferenttime.
Weusetheequationsumexpressionasfollows:2112))()((tptppmiii∑==(12)Wheremrepresentsthenumberofparameters,t1andt2representtwodifferenttimes,pi(t)representsthevalueofparameteriattimet.
Ifthevalueofpisbiggerthanthreshold,thereisanotablepatternvariance.
Thesystemneedtomonitorandanalyzeagain.
5InitialTestingResultsThefollowfiguresandtablesaresometestresults.
Inthefigures,The33accountIDsarefilteredoutbecausethecontentoftheirarticlesismatchedbythefilteringrulesofmilitaryaffairsclass.
Theydiscussedaroundthistopic.
Weusespotinvestigatingmethodstotracksomevitallinkclues.
Thismethodcontainsthreestepsasfollows:StepOne:GeneralInvestigationWeconsiderallaccountIDsasawhole.
Infig.
4thereareseveralcliquesinthiscommunity.
Thecentralkeypersonsofcliquesareobvious.
ID1andID7havebiggernodesanddeepercolor.
AndthearticlesfromID18,ID19,ID20andID21cannotarouseotherpersons'interest.
WecanidentifyeachIDcharacter'sstatusthroughcomputingSNAparametervalues.
(Seetab.
1)Fig.
4Generalinvestigation.
Tab.
1TopthreeaccountIDswithmaximumparametervalues.
ThistablerepresentsthetopthreekeyaccountIDsaccordingtothemaximumparametervalues.
WefindID1andID7havehighercentralityandareconsideredasleaders.
StepTwo:PartitionInvestigationWeneedtopaymoreattentiontothetwoleadersID1andID7.
ThepartitiongroupwecaredalsoincludestheaccountIDswhichhaverelationtoeitherID1orID7.
(Seefig.
5)Fig.
5.
Partitioninvestigation.
Wecanfindanimportantrolethatmaybeignoredinstep1.
HeisID10.
HenotonlyrepliedID1,butalsorepliedID7.
AlthoughhehasnothighcentralityasID1andID7,hemaybetheinformationsource.
StepThree:IndividualInvestigationWeshouldemphasisoninvestigatingthekeypersonsandtheirrepliers.
Wecanfindmoreneighborhoodinformationandclues.
Fig.
6.
Individualinvestigation.
Infig.
6,nineaccountIDsrepliedID1exceptID4.
ID1repliedID4unexpectedly.
WesupposethatanothercliquewillcomeuparoundID4.
6ConclusionsandFutureWorkThispaperintroducestheBBScontentsecurityframeworkroughly.
ThedynamicmonitoringmodelusesacombinedapproachofTextFiltering,SocialNetworkAnalysis(SNA)andspotinvestigatingmethod.
Inthecontentfiltering,anovelfastmulti-patternmatchingalgorithmisproposedandmoreefficientforChineselanguageespecially.
Inordertoimprovetheeffectofcontentfiltering,wedesigntoaddasemanticfunctioninthecontentfiltermodulebasedonknowledgerules.
Besides,moreBBSdataminingworkneedtodowithSNAtheory.
References:[1]HeJing,LiuHai-yan,Real-timeContentFilteringBasedonVectorSpaceModel,ComputerEngineering,Vol.
30,No.
15,2004,8,pp.
26-27.
[2]JinYao-hong,DesignandImplementationofSemantic-basedTextFilteringSystem,ComputerEngineeringandApplication,No.
17,2003,pp.
22-25.
[3]SUGui-yang,LIJian-hua,MAYing-hua,etal,Improvingtheprecisionofthekeyword-matchingpornographictextfilteringmethodusingahybridmodel,JournalofZhejiangUniversitySCIENCE,Vol.
5,No.
9,2004,pp.
1106-1113.
[4]LiuChang-yu,TangChang-jie,YuZhong-hua,BayesDiscriminatorforBBSDocumentBasedonLatentSemanticAnalysis,ChineseJournalofComputers,Vol.
27,No.
4,2004,pp.
566-572.
[5]VilleH.
Tuulos,HenryTirri,Combiningtopicmodelsandsocialnetworksforchatdatamining,Proceedings-IEEE/WIC/ACMInternationalConferenceonWebIntelligence,WI2004,2004,pp.
206-213.
[6]KouZhong-bao,ZhangChang-shui,Replynetworksonabulletinboardsystem,PhysicalReviewE(Statistical,Nonlinear,andSoftMatterPhysics),Vol.
67,No.
3,March,2003,pp.
36117-1-6.
[7]PetterHolme,CharacteristicsofSmallWorldNetworks,http://www.
tp.
umu.
se/_kim/Network/holme1.
pdf,20th,April,2001.
[8]D.
J.
Watts,S.
H.
Strogatz,CollectiveDynamicsof`Small-World'Networks,Nature,1998,pp.
393-440.
[9]Commentz-WalterB,Astring-matchingalgorithmfastontheaverage,Proc6thInternationalColloquiumonAutomataLanguagesandProgramming,1979,pp.
118-132.
[10]AhoAV,CorasickMJ,Efficientstringmatching:anaidtobibliographicsearch,CommunicationsoftheACM,No.
18,1975,pp.
333-340.
[11]BoyerRS,MooreJS,Afaststring-searchingalgorithm,CommunicationsoftheACM,No.
20,1977,pp.
762-772.
[12]Salton,G.
(Ed.
),AutomaticTextProcessing.
AddisonWesley,Massachusetts,1989.

2021HawkHost老鹰主机黑色星期五虚拟主机低至3.5折 永久4.5折

老鹰主机HawkHost是个人比较喜欢的海外主机商,如果没有记错的话,大约2012年左右的时候算是比较早提供支付宝付款的主机商。当然这个主机商成立时间更早一些的,由于早期提供支付宝付款后,所以受众用户比较青睐,要知道我们早期购买海外主机是比较麻烦的,信用卡和PAYPAL还没有普及,大家可能只有银联和支付宝,很多人选择海外主机还需要代购。虽然如今很多人建站少了,而且大部分人都用云服务器。但是老鹰主机...

RackNerd 2022春节促销提供三款年付套餐 低至年付10.88美元

RackNerd 商家我们应该是比较熟悉的商家,速度一般,但是人家便宜且可选机房也是比较多的,较多集中在美国机房。包括前面的新年元旦促销的时候有提供年付10美元左右的方案,实际上RackNerd商家的营销策略也是如此,每逢节日都有活动,配置简单变化,价格基本差不多,所以我们网友看到没有必要囤货,有需要就选择。RackNerd 商家这次2022农历新年也是有几款年付套餐。低至RackNerd VPS...

VirMach:$27.3/月-E3-1240v1/16GB/1TB/10TB/洛杉矶等多机房

上次部落分享过VirMach提供的End of Life Plans系列的VPS主机,最近他们又发布了DEDICATED MIGRATION SPECIALS产品,并提供6.5-7.5折优惠码,优惠后最低每月27.3美元起。同样的这些机器现在订购,将在2021年9月30日至2022年4月30日之间迁移,目前这些等待迁移机器可以在洛杉矶、达拉斯、亚特兰大、纽约、芝加哥等5个地区机房开设,未来迁移的时...

tianyaclub为你推荐
唐人社美国10次啦我看到罗显琪第一眼就喜欢他了!当中我们一共见过10次面,也发生过两次关系! 但是他有女朋友对我也只是一时兴起吧,所以第十次见面之后,我们再没有联系,但是现在我大姨妈晚了很多天了,我担心是否怀孕,如果有的话,我又不想打掉,该找他吗?腾讯空间首页腾讯空间主页哪去了视频制作软件哪个好什么视频编辑软件比较适合小白的985和211哪个好985和211哪个强?具体分析点。朱祁钰和朱祁镇哪个好明英宗和明代宗哪个皇帝要做得好浮动利率和固定利率哪个好浮动利率房贷与固定利率房贷比较 购房者如何选择三国游戏哪个好玩三国类单机游戏哪个最好玩啊?手机炒股软件哪个好免费手机炒股软件哪个好?网校哪个好初中网校哪个好?51空间登录51咋登录 咋登录好友的51空间
免费网站空间申请 联通c套餐 bbr pw域名 wdcp 表格样式 NetSpeeder qq数据库 网通ip 有奖调查 网站卫士 phpmyadmin配置 服务器托管什么意思 免费phpmysql空间 怎么建立邮箱 美国盐湖城 德讯 ledlamp 云服务是什么意思 北京主机托管 更多