首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   21篇
  完全免费   2篇
  自动化技术   23篇
  2014年   2篇
  2012年   2篇
  2011年   3篇
  2010年   5篇
  2009年   3篇
  2006年   1篇
  2005年   2篇
  2002年   3篇
  2001年   2篇
排序方式: 共有23条查询结果,搜索用时 140 毫秒
1.
三层Client/Server结构分析   总被引:13,自引:0,他引:13  
本文就网络计算模式的发展,介绍了传统两层Client/Server结构特点,详细分析了由此发展而来的三层Client/Server的逻辑结构和物理结构及实现它需要考虑的因素,并重点对Browser/Server结构和相关技术现状进行了研究。  相似文献
2.
利用路由器自适应限流防御分布拒绝服务攻击   总被引:7,自引:1,他引:6       下载免费PDF全文
梁丰  David Yau 《软件学报》2002,13(7):1220-1227
提出一种自适应路由器限流算法防御分布拒绝服务攻击的机制.该算法的关键是由被攻击者要求经挑选的相距k跳(hop)的上游路由器对目的为被攻击者的数据流进行限流,从而将被攻击者的服务支援在各数据流之间达到一种类最大-最小公平的流量分配.还在一个实际的因特网拓扑上针对攻击数据流和合法数据流的不同分布和流量模型考察了算法的效果.结果表明这种以服务器为中心的路由器限流是对抗分布拒绝服务攻击的一种很有前途的方法.  相似文献
3.
分布式虚拟环境中的聊天机器人的研究   总被引:5,自引:0,他引:5  
该文探讨了通过自然语言界面从基于Web的应用中获取知识的一种方法。介绍了一些著名聊天机器人程序,着重给出了基于AIML的聊天机器人A.L.I.C.E的运行机制,并分析了其适合于分布式应用的特点。通过对其进行改进,将其结合进分布式虚拟环境中,构造了一个基于Web的分布式虚拟环境中的聊天机器人。  相似文献
4.
A mobile-agent-based approach to software coordination in the HOOPE system   总被引:3,自引:0,他引:3  
Software coordination is central to the construction of large-scale high-performance distributed applications with software services scattered over the decentralized Internet. In this paper, a new mobile-agent-based architecture is proposed for the utilization and coordination of geographically distributed computing resources. Under this architecture, a user application is built with a set of software agents that can travel across the network autonomously. These agents utilize the distributed resources and coordinate with each other to complete their task. This approach' s advantages include the natural expression and flexible deployment of the coordination logic, the dynamic adaptation to the network environment and the potential of better application performance. This coordination architecture, together with an object-oriented hierarchical parallel application framework and a graphical application construction tool, is implemented in the HOOPE environment, which provides a systematic support for the de  相似文献
5.
DTM:一种面向网络计算的动态信任管理模型   总被引:2,自引:0,他引:2  
在开放的互联网中,信任关系的建立是实现跨自治域资源共享与协同的前提.然而,网络计算环境的分布自治特性,使得各类复杂系统中应用不同的信任管理机制,容易导致信任定义的不一致问题,特别是很多系统为支持多域协作,直接假设实体间信任具有传递特性,而在模型中缺乏该性质成立的条件;此外,网络计算环境中的动态演化特性,使得驱动实体间协作的信任关系随需而变,而现有信任管理模型仅仅关注于系统功能结构,缺乏对这种动态性的描述.文中提出了一种动态信任管理模型DTM,基于信念公式形式化定义了主体间的信任公式,并将信任的传递特性(信任链)解释为模型的一条性质.在该模型中,针对信任关系的动态特征,以时间为参量刻画主体公式集,以事件为触发条件刻画主体间信任的变化,并基于正则事件序列描述信任管理的资源授权过程,可刻画主体间信任的建立过程.最终,设计、实现了一个信任管理系统CROWN-TM,并进行了初步实验分析.  相似文献
6.
Mobile agent has shown its promise as a powerful means to complement and enhance existing technology in various application areas. In particular, existing work has demonstrated that MA can simplify the development and improve the performance of certain classes of distributed applications, especially for those running on a wide-area, heterogeneous, and dynamic networking environment like the Internet. In our previous work, we extended the application of MA to the design of distributed control functions, which require the maintenance of logical relationship among and/or coordination of proc- essing entities in a distributed system. A novel framework is presented for structuring and building distributed systems, which use cooperating mobile agents as an aid to carry out coordination and cooperation tasks in distributed systems. The framework has been used for designing various distributed control functions such as load balancing and mutual ex- clusion in our previous work. In this paper, we use the framework to propose a novel ap- proach to detecting deadlocks in distributed system by using mobile agents, which dem- onstrates the advantage of being adaptive and flexible of mobile agents. We first describe the MAEDD (Mobile Agent Enabled Deadlock Detection) scheme, in which mobile agents are dispatched to collect and analyze deadlock information distributed across the network sites and, based on the analysis, to detect and resolve deadlocks. Then the design of an adaptive hybrid algorithm derived from the framework is presented. The algorithm can dynamically adapt itself to the changes in system state by using different deadlock detec- tion strategies. The performance of the proposed algorithm has been evaluated using simulations. The results show that the algorithm can outperform existing algorithms that use a fixed deadlock detection strategy.  相似文献
7.
随着基于构件的程序挖掘思想的提出,在这一概念下的构件组装技术已成为研究重点。文章研究了Internet计算环境的构件特点,在分析构件不匹配和程序挖掘的组装特性的基础上,提出了一种基于分解一适配一综合的DASC组装模型。  相似文献
8.
随着互联网的飞速发展,网络安全逐渐成为一个潜在的巨大问题。金融系统的网络安全问题犹为重要,这关系到国家的经济命脉的正常跳动,所以金融业网络安全方案的解决不容忽视。本文较系统地阐述了银行系统网络安全解决方案的设计与实现。  相似文献
9.
提出了一个事件机制设计的框架,定义了事件的各个方面特性。这个框架将事件用7个模型来描述:对象模型、事件模型、命名模型、观察模型、时间模型、通知模型、资源模型。对每个模型进行了详细的讨论。并讨论了与Internet环境中事件机制相关的工作,提出了可能出现的研究热点问题。  相似文献
10.
This study investigated the association between trust in individuals, social institutions and online trust on the disclosure of personal identifiable information online. Using the Internet attributes approach that argues that some structural characteristics of the Internet such as lack of social cues and controllability are conducive to a disinhibitive behavior it was expected that face to face trust and online trust will not be associated. In addition, it was expected that from the three components of trust, online trust only will be associated with the disclosure of identifiable personal information online. A secondary analysis of the 2009 Pew and American Life of Internet users (n = 1698) survey was conducted. In contrast with the Internet attribute approach the effect of trust in individuals and institutions was indirectly associated with the disclosure of identifiable information online. Trust in individuals and institutions were found to be associated with online trust. However, online trust only, was found to be associated with the disclosure of personal identifiable information. While trust online encourages the disclosure of identifiable information, perception of privacy risks predicted refraining from posting identifiable information online. The results show a complex picture of the association of offline and online characteristics on online behavior.  相似文献
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号