首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Trusted computing is a new technology for building secure system in recent years. TCG (Trusted Computing Group) has drafted a series of specifications on trusted computer. More and more hardware and software have been developed by manufactures, and trusted computer shows many advantages to protcct information security. In the period of designing secure platform, TCG specifications arc analyzed and some deficiency is found in them. This paper presents the main idea of TCG specifications and gives some suggestions on three neglected problems: compatibility with old applications, security policy and mechanism of self recovery.  相似文献   

2.
Editor's note     
The 21 st century is the information era. The rapid development of information technology has been making tremendous impacts on our economic and life style. Software and microelectronics technology are the very foundation of modern information technology; that is, microelectronics is the basis of all hardware devices, and software plays the director role in controlling those devices to function correctly and serve human society effectively. Software can control hardware devices, perform computation and communi- cation, and so on. Huge effort has been made to establish a computing model that is both expressive and natural for construction and evolution, abstraction of commonalities for reuse, interoperation for bridging heterogeneity, and so on. Such a pursuit greatly stimulates the development of the software models, operating platforms and methods involved. To cope with the extremely open, dynamic, ever-changing Internet, some novel software technologies, such as grid computing, pervasive computing, service-oriented computing, and Internetware, have been established, and some preliminary achievements and experiences have been gained.  相似文献   

3.
基于时序逻辑的移动计算的形式方法分析   总被引:1,自引:0,他引:1  
魏峻 《计算机科学》2000,27(6):22-27
At present,mobile computing is widely considered as a new computing paradigm supported by advanced computational technologies.One of main characteristics of this paradigm is the ability to dynamically change the binding for hardware and/or software components,that is mobility. Although there are many languages appeared to announce supporting mobile computing,the requirements and features of this paradigm are still scarcely recognized.So a lot of research is being expanded on formal models and methods for mobile computing. In this paper,we analyze a temporal logic based formalism for mobile computing——Mobile Unity. At first,we summarize the features of mobile computing,and generalize that mobile systems should be decoupled,strongly-autonomous,context-dependent and owning new requirements for location-transparency.Then we introduce Mobile Unity,its extensions for U NITY from syntax to computational semantics,specially analyze the correspondence between the language structures of Mobile Unity and the abstraction of mobile features,such as location,mobility,transient interactions etc.At the end,we conclude its some deficiency for supporting mobile computing.  相似文献   

4.
The Internet provides a global open infrastructure for exchanging and sharing of various resource all over the world. The rapid development and wide application of the Internet makes it a new mainstream platform to use, develop, deploy and execute software systems and applications. With the vision of "Internet as a computer", many technical initiatives such as pervasive computing, grid computing, service computing and cloud computing emerges on this open and dynamic environment. In order to support the various new application styles and accommodate the fundamental change of the underlying infrastructure, many specific software technologies such as service-oriented architecture are proposed for current practices. While these technologies are useful and widely accepted, they have not formed a systematic solution as matured as the object-oriented technology, as a uniformed software methodology and technology system is yet to be developed.  相似文献   

5.
Institute of Computing Technology (ICT) is the first research institute in China focusing on computer science and engineering. ICT employs a strong research staff of 250 people, including 40 professors and 90 associate professors. More than 900 graduate students are enrolled at ICT, including 430 Ph.D. candidates. The major research fields include highperformance computing, CPU and other chips technology, network and digital technology, operating system, grid and services computing, knowledge processing, intelligent Internet software, information security, and bioinformatics. ICT is soliciting applications from top candidates in the following fields.  相似文献   

6.
"Cloud"is a common metaphor for an Internet accessible infrastructure(e.g.data storage and computing hardware)which is hidden from users.Cloud Computing makes data truly mobile and a user can simply access a chosen cloud with any internet accessible device.In Cloud Computing,IT-related capabilities are provided as services,accessible without requiring detailed knowledge of the underlying technology.Thus,many mature technologies are used as components in Cloud  相似文献   

7.
Even with attractive computational advantages, mobile agent technology has not developed its full potential due to various security issues. This paper proposes a method called Private Key Consignment to solve the problem of how to protect the data carried by mobile agents. It exploits new functionalities and mechanism provided by the trusted computing technology, and adopts both public key and symmetric key cryptographic means for data and key protection. The most notable feature of this method is that it protects the private key of the agent by consigning it to a tamper proof hardware, thus, enabling convenient and secure use of the private key. It provides a new scheme of mobile agents' data protection.  相似文献   

8.
There is a class of complex, large-scale systems that are composed of many interacted and spatially distributed subsystems such as the power grids, transportation systems, and large scale chemical processes. With the progress of industrial technology, field bus, integrated circuit technologies and network communication technology, this automation system has taken a totally new configuration in which each subsystem owns only one hardware controller for controlling the subsystem itself, and all hardware controllers are connected by networks for exchanging information with each other or with upper layer controllers. In this distributed (or decentralized) framework, the distributed control algorithms are usually adopted because the classical centralized control solutions are often impractical due to their heavy computational demands and the lack of fault tolerance....  相似文献   

9.
The technology of virtual machines is widely applied in many fields, such as code transplanting, cross-platform computing, and hardware simulation. The main purpose is to simulate the environment of general hardware by means of software and realize the operation of byte codes in processor. Virtual machines are commonly used to distribute programs in an architecture-neutral format, which can easily be interpreted or compiled. A long-running question in the design of virtual machines is whether stack architecture or register architecture can be implemented more efficiently with an interpreter. After introducing the basic theory, a solution to designing and realizing virtual machine constructing on register processor proposed in this paper, which gives a preliminary study on simulating the process of instructions in Intel x86.  相似文献   

10.
This paper addresses the problem why grid technology has not spread as fast as the Web technology of the 1990's. In the past 10 years, considerable efforts have been put into grid computing. Much progress has been made and more importantly, fundamental challenges and essential issues of this field are emerging. This paper focuses on the area of grid system software research, and argues that usability of grid system software must be enhanced. It identifies four usability issues, drawing from international grid research experiences. It also presents advances by the Vega Grid team in addressing these challenges.  相似文献   

11.
Technical framework for Internetware: An architecture centric approach   总被引:13,自引:0,他引:13  
Being a new software paradigm evolved by the Internet, Internetware brings many challenges to the traditional software methods and techniques. Sponsored by the national basic research program (973), researchers in China have developed an architecture centric technical framework for the definition, incarnation and engineering of Internetware. First of all, a software model for Internetware is defined for what to be, including that Internetware entities should be packaged as components, behaving as agents, interoperating as services, collaborating in a structured and on demand manner, etc. Secondly, a middleware for Internetware is designed and implemented for how to be, including that Internetware entities are incarnated by runtime containers, structured collaborations are enabled by runtime software architecture, Internetware can be managed in a reflective and autonomic manner, etc. Thirdly, an engineering methodology for Internetware is proposed for how to do, including the way to develop Internetware entities and their collaborations by transforming and refining a set of software architectures which cover all the phases of software lifecycle, the way to identify and organize the disordered software assets by domain modeling, etc.  相似文献   

12.
Today’s software systems need to support complex business operations and processes.The development of the web-based software systems has been pushing up the limits of traditional software engineering methodologies and technologies as they are required to be used and updated almost real-time,so that users can interact and share the same applications over the internet as needed.These applications have to adapt quickly to the diversified and dynamic changing requirements in the physical,technological,economical and social environments.As a consequence,we are expecting a major paradigm shift in software engineering to reflect such changes in computing environment in order to better address the fundamental needs of organisations in this new era.Existing software technologies,such as model driven development,business process engineering,online(re-)configuration,composition and adaptation of managerial functionalities are being repurposed to reduce the time taken for software development by reusing software codes.The ability to dynamically combine contents from numerous web sites and local resources,and the ability to instantly publish services worldwide have opened up entirely new possibilities for software development.In retrospect to the ten years applied research on Internetware,we have witnessed such a paradigm shift,which brings about many changes to the developmental experience of conventional web applications.Several related technologies,such as cloud computing,service computing,cyber-physical systems and social computing,have converged to address this emerging issue with emphasis on different aspects.In this paper,we first outline the requirements that the Internetware software paradigm should meet to excel at web application adaptation;we then propose a requirement model driven method for adaptive and evolutionary applications;and we report our experiences and case studies of applying it to an enterprise information system.Our goal is to provide high-level guidelines to researchers and practitioners to meet the challenges of building adaptive industrial-strength applications with the spectrum of processes,techniques and facilities provided within the Internetware paradigm.  相似文献   

13.
Trustworthiness of Internet-based software   总被引:16,自引:0,他引:16  
Recent years see an increasing concern over the trustworthiness of Inter- net-based software. By analyzing the trustworthiness of Internet-based software and the nature of the Internet applications, we point out that, on the one hand, due to the open- ness and dynamic nature of the Internet, the identity trustworthiness and the capability trustworthiness of the software are facing serious challenges; on the other hand, in order to ensure the trustworthiness of the whole system, emerging computing paradigms based on the collaboration of autonomous software need some impacts on the behavior of the software. Here we put forward a conceptual model for the trustworthiness of Inter- net-based software, and propose a trustworthy assurance framework for Internet-based virtual computing environment (iVCE). This framework deals with the trustworthy proper- ties of software on identity, capability and behavior in a combinated way. The authorization management in inter-domain computing environment, assurance on high availability of service and incentive mechanism for autonomic collaboration are taken as three core mechanisms of iVCE trustworthy assurance.  相似文献   

14.
Preface          下载免费PDF全文
The vision of ''Internet as a computer'' motivates many technical trends, like pervasive computing, grid computing, service computing and recently, cloud computing, as well as some business trends, like modern service industry, digital economy and smarter planet. These evolutionary changes demand that the software systems which are running on the open and dynamic Internet have to be autonomous, context-sensitive, continuous-reactive, evolutionary, and proactive, and the software entities dispersed on distributed nodes over the Internet will be turned into self-contained, autonomous and adaptive. Thus, like the information Web, i.e. the World Wide Web, these Internet-based software entities will constitute a software Web. That gives birth a new software paradigm. A portmanteau term ''Internetware'' is used to denote the future software-web. An Internetware system will be able to perceive the changes of the open and dynamic environment, respond to the changes, and exhibit the context-aware, adaptive and trustworthy behaviors. The mission of Internetware may challenge many aspects of software technologies, from the operating platforms and the programming models to the engineering approaches. Internetware 2010, the second Asia-Pacific Symposium on Internetware, aims to provide an interactive forum where researchers and professionals from multiple disciplines and domains meet and exchange ideas to explore and address the challenges brought by Internetware. The symposium was held at Suzhou, China, during the 2-4 of Nov, 2010. Thirty three papers were submitted and each of them was reviewed by at least two members of an International Program Committee. Among them, 12 have been accepted (which means an acceptance rate of 36%) for their quality as well as for their interesting terms of discussions for the symposium attendees. This special issue contains 7 revised and substantially extended papers from the 12 based on presentations at the symposium: ......  相似文献   

15.
16.
DM642 is a DSP chip specially used for video processing that offered by TI company,it adds a lot of peripheral devices and inter faces based on C6000 series of chips,with the high speed computing ability,it has a wide range of applications in multimedia field.This pa per analyzes and describes the works and the main functional modules of two-way video synthesis hardware system based on DM642.  相似文献   

17.
《微型电脑应用》2009,25(12):I0001-I0003
Expert Forum
The Developing Trend of Technology in Software Industry
YAN Jun-wei (CIMS Research Center, Tongji University, Shanghai 200092, China )
Abstract: According to national planning for the electronic information industry and software industry, it is stated that software industry has a nuclear place and strategic task in the near three years. Now, the development of software industry presents the characteristics of technology, management and performance. The open, fuse and network from technical characteristics are discussed. It is included that open trend with open-original code software, fuse trend in the name of intelligent software products and "Industry Software" products and network trend with an importance. In large many of key technologies, the paper mainly discusses the developing trend of component-ware, middle-ware and embedded software and so on.
Keywords: Software industry; Industry development technology; Open-original software; Embedded software  相似文献   

18.
Dynamic optimization relies on runtime profile information to improve the performance of program execution. Traditional profiling techniques incur significant overhead and are not suitable for dynamic optimization. In this paper, a new profiling technique is proposed, that incorporates the strength of both software and hardware to achieve near-zero overhead profiling. The compiler passes profiling requests as a few bits of information in branch instructions to the hardware, and the processor executes profiling operations asynchronously in available free slots or on dedicated hardware. The compiler instrumentation of this technique is implemented using an Itanium research compiler. The result shows that the accurate block profiling incurs very little overhead to the user program in terms of the program scheduling cycles. For example, the average overhead is 0.6% for the SPECint95 benchmarks. The hardware support required for the new profiling is practical. The technique is extended to collect edge profiles for continuous phase transition detection. It is believed that the hardware-software collaborative scheme will enable many profile-driven dynamic optimizations for EPIC processors such as the Itanium processors.  相似文献   

19.
Cloud computing is currently an embryonic domain in the area of information technology that possesses the power of transforming the way information technology (IT) services are delivered and maintained in the business world. Pay as per the usage kind of cost structure coupled with delivery of computing services through internet makes cloud computing an exciting and potential growth oriented information technology model compared with conventional computing services delivery models. Various additional features like scalability, flexibility and easy deployment process creates a window for the organizations even relatively smaller in size to get benefitted by the highly advanced & modern technologies without incurring substantial cost. In spite of so many benefits of this new delivery model, concerns are beginning to grow about how safe an environment it is. Despite of all the hype surrounding the cloud, enterprise customers are still reluctant to deploy their business in the cloud. Security is one of the major issues which reduces the growth of cloud computing and complications with data privacy and data protection continue to plague the market. Other related concerns associated with the adoption of cloud computing include trust on service providers, loss of control and compliance issues. This paper is an attempt to explore security & trust issues linked with cloud computing adoption in the Small and Medium Enterprises (SME) sector.  相似文献   

20.
Visual information is highly advantageous for the evolutionary success of almost all animals.This information is likewise critical for many computing tasks,and visual computing has achieved tremendous successes in numerous applications over the last 60 years or so.In that time,the development of visual computing has moved forwards with inspiration from biological mechanisms many times.In particular,deep neural networks were inspired by the hierarchical processing mechanisms that exist in the visual cortex of primate brains(including ours),and have achieved huge breakthroughs in many domainspecific visual tasks.In order to better understand biologically inspired visual computing,we will present a survey of the current work,and hope to offer some new avenues for rethinking visual computing and designing novel neural network architectures.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号