首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
Implicit surfaces are often used in computer graphics. They can be easily modeled and rendered, and many objects are composed of them in our daily life. In this paper, based on the concept of virtual objects, a novel method of real-time rendering is presented for reflection and refraction on implicit surface. The method is used to construct virtual objects from real objects quickly, and then render the virtual objects as if they were real objects except for one more step of merging their images with the real objects' images. Characteristics of implicit surfaces are used to compute virtual objects effectively and quickly. GPUs (Graphics Processing Units) are used to compute virtual vertices quickly and further accelerate the computing and rendering processes. As a result, realistic effects of reflections and refractions on implicit surfaces are rendered in real time.  相似文献   

2.
Trusted computing is a new technology for building secure system in recent years. TCG (Trusted Computing Group) has drafted a series of specifications on trusted computer. More and more hardware and software have been developed by manufactures, and trusted computer shows many advantages to protcct information security. In the period of designing secure platform, TCG specifications arc analyzed and some deficiency is found in them. This paper presents the main idea of TCG specifications and gives some suggestions on three neglected problems: compatibility with old applications, security policy and mechanism of self recovery.  相似文献   

3.
Based on cryptographic technique, a security solution of agent system is presented in this paper, which solves the problem of security authentication and security communication in mobile agent system. Finally the situation of application is introduced when the solution has been applied to the agent application system.  相似文献   

4.
5.
《数码时代》2009,(4):24-27
有见到长相酷似上图中之可疑人物者,望速与警方取得联系。这不是玩笑。重复一遍,这不是玩笑……事实上这确实不是玩笑,真的是日本神奈川县警方贴出的一张通辑令,  相似文献   

6.
In the light of multi-continued fraction theories, we make a classification and counting for multi-strict continued fractions, which are corresponding to multi-sequences of multiplicity m and length n. Based on the above counting, we develop an iterative formula for computing fast the linear complexity distribution of multi-sequences. As an application, we obtain the linear complexity distributions and expectations of multi-sequences of any given length n and multiplicity m less than 12 by a personal computer. But only results of m=3 and 4 are given in this paper.  相似文献   

7.

In the domain of web security, websites strive to prevent themselves from data gathering performed by automatic programs called bots. In that way, crawler traps are an efficient brake against this kind of programs. By creating similar pages or random content dynamically, crawler traps give fake information to the bot and resulting by wasting time and resources. Nowadays, there is no available bots able to detect the presence of a crawler trap. Our aim was to find a generic solution to escape any type of crawler trap. Since the random generation is potentially endless, the only way to perform crawler trap detection is on the fly. Using machine learning, it is possible to compute the comparison between datasets of webpages extracted from regular websites from those generated by crawler traps. Since machine learning requires to use distances, we designed our system using information theory. We considered widely used distances compared to a new one designed to take into account heterogeneous data. Indeed, two pages does not have necessary the same words and it is operationally impossible to know all possible words by advance. To solve our problematic, our new distance compares two webpages and the results showed that our distance is more accurate than other tested distances. By extension, we can say that our distance has a much larger potential range than just crawler traps detection. This opens many new possibilities in the scope of data classification and data mining.

  相似文献   

8.
Research on Web-Based Product Structure and Configuration Management   总被引:1,自引:0,他引:1  
An enhanced system architecture of Web-based product structure and configuration management system along with its, functions are is presented. The key techniques, such as construction of object models of product structure and product configuration, hybrid approach method in product configuration management, sharing and integration of heterogeneous product data, integration with other sub-systems, are discussed too. A prototype system is developed by J2EE technology.1 Introduction Taking BOM…  相似文献   

9.
Pang  Bo Wang  Zhenqing 《微计算机信息》2004,20(1):114-115
This paper introduces the technology of activeX which connecting VB and MATLAB, the method of interpolation and curve fitting of matlab, and the establishment of three-dimensional parameter field.  相似文献   

10.
Currently many enterprises have established some independent application systems such as CAD, CAPP, CAE and so on. Enterprise information integration makes these information islands connected, and thereby forms a uniform enterprise-wide information environment. First this paper discusses the main research contents of enterprise integration. Then the author introduces an Internet-based configurable and open information integration framework, and presents a multi-tier integration architecture based on reusable component. Finally a development case of enterprise integration framework is introduced.  相似文献   

11.
Fraudulent and malicious sites on the web   总被引:1,自引:1,他引:0  
Fraudulent and malicious web sites pose a significant threat to desktop security, integrity, and privacy. This paper examines the threat from different perspectives. We harvested URLs linking to web sites from different sources and corpora, and conducted a study to examine these URLs in-depth. For each URL, we extract its domain name, determine its frequency, IP address and geographic location, and check if the web site is accessible. Using 3 search engines (Google, Yahoo!, and Windows Live), we check if the domain name appears in the search results; and using McAfee SiteAdvisor, we determine the domain name’s safety rating. Our study shows that users can encounter URLs pointing to fraudulent and malicious web sites not only in spam and phishing messages but in legitimate email messages and the top search results returned by search engines. To provide better countermeasures against these threats, we present a proxy-based approach to dynamically block access to fraudulent and malicious web sites based on the safety ratings set by McAfee SiteAdvisor.  相似文献   

12.
13.
This paper presents a checkpoint setting techniqute to eliminate domino effect in backward recovery in disttributed systems,which is very efficient,powerful,widely applicable and easy to be implememted,Besides theoretical analysis,an implementation on UNIX system and a package for software fault-tolerance are introduced.Then the problems of checkpoint management and process termination are discussed.  相似文献   

14.
As a newly discipline and methodology in the field of Artificial Intelligent, All Set Theory can be applied to describe macroscopic complex large systems and establish models in uncertain systems. The application of All Set Theory in controlling and decision-making for systems was discussed in the paper, furthermore, the Decision-making and Controlling System based on All Set Theory (AS-DCS) is put forward. At last, the model of AS-DCS and its structure as well as its program flow chart are presented.  相似文献   

15.
In this paper, the architecture of trustworthy and controllable networks is discussed to meet arising application requirements. After reviewing the lessons and experiences of success and failure in the Internet and summarizing related work, we analyze the basic targets of providing trustworthiness and controllability. Then, the anticipant architecture is introduced. Based on the resulting design, several trustworthy and controllable mechanisms are also discussed.  相似文献   

16.
The 6th International Conference on Control and Automation (ICCA07) will be held on May 30 to June l, 2007, in Guangzhou, China. The conference is jointly organized by the IEEE Control Systems Chapter, Singapore and IEEE Control Systems Chapter, Guangzhou, China, and sponsored by South China University of Technology, China and Chinese University of Hong Kong, Hong Kong. It is to create a forum for scientists and practicing engineers throughout the world to present the latest research findings and ideas in the areas of control and automation.  相似文献   

17.
In “Genetic Programming and Emergence” Banzhaf cogently demonstrates that emergence occurs constantly in genetic programming. I summarize the Emergence Test, which my colleagues and I introduced over a decade ago, which complements and substantiates Banzhaf’s views.  相似文献   

18.
As the Quality of Service (QoS) becomes increasingly important in the Internet development, there are more and more researches focusing on the issues of QoS negotiation. Mobile software agents represent a valid alternative to the implementation of strategies for the negotiation. In this paper, a QoS negotiation and renegotiation system architecture based on mobile agents is proposed. These agents perform the task in the whole process and therefore reduce the network load, overcome latency, and avoid frequent exchange information between clients and server. The simulation results show that it can improve the network resource utility about 10%.  相似文献   

19.
20.
Information security is the most important in the process of establishment of the system. This paper makes systematic summary according to the methodology and technology of the safety design in Quality Information Management System (QIMS) based on B/S mode.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号