首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 218 毫秒
1.
This paper analyses the advantages of comhining Web service and data warehouse, then introduces a distributed data warehouse model based on Web service. It also introduces some features of Web services and data warehouse, Web service is a bridge, which can link different models, different operation systems and different program languages. With the development and application of Web service technology, the current operation of design and application will shift to develop and make use of Web service. Web service will matke "software as service" come true and finally let people think software is of great value, and its value can be embodied and transferred on the web. As a decision supporting system, data warehouse provides a solid plattbrm formed by current data and past data. Using this platform, companies can make a series of commerce analysis. This work combines the Web service and data warehouse, extends data warehouse's network ability. Then, Companies Corporation and individual can obtain information conveniently.  相似文献   

2.
An Attack-Finding Algorithm for Security Protocols   总被引:5,自引:1,他引:5       下载免费PDF全文
This paper proposes an automatic attack construction algorithm in order to find potential attacks on ecurity protocols.It is based on a dynamic strand space model,which enhances the original strand space model by introducing active nodes on strands so as to characterize the dynamic procedure of protocol execution.With exact causal dependency relations between messages considered in the model,this algorithm can avoid state space explo-sion caused by asynchronous composition.In order to get a finite state space,a new method called strand-added on demand is exploited,which extends a bundle in an incremental manner without requiring explicit configuration of protocol execution parameters.A finer granularity model of term structure is also introduced, in which subterms are divided into check subterms and data subterms .Moreover,data subterms can be further classified based on the compatible data subterm relation to obtain automatically the finite set of valid acceptable terms for an honest principal.In this algorithm,terms core is designed to represent the intruder‘s knowledge compactly,and forward search technology is used to simulate attack patterns easily.Using this algorithm,a new attack on the Dolve-Yao protocol can be found,which is even more harmful beeause the secret is revealed before the session terminates.  相似文献   

3.
In mobile database systems,mobility of users has a significant impact on data replication.As a result,the various replica control protocols that exist today in traditional distributed and multidatabase environments are no longer suitable To solve this problem,a new mobile database replication scheme,the Transaction-Level Result-Set Propagation(TLRSP)model,is put forward in this paper,The conflict dectction and resolution strategy based on TLRSP is discussed in detail,and the implementation algorithm is proposed,In order to compare the performance of the TLRSP model with that of other mobile replication schemes,we have developed a detailde simulation model.Experimantal results show that the TLRSP model provides an effcient support for replicated mobile database systems by reducing reprocessing overhead and maintaining database consistency.  相似文献   

4.
Mobile Agent is a kind of novel agent technology characterized by mobile,intelligent,parallel and asynchronous computing.In this paper,a new information service model that adopts mobile agent technology is introduced first.and then an experimental system DOLTRIA system that is implemented based on the model is described.The DOLTRIA system implemented by WWW framework and Java can search for relevant HTML documents on a set of Web servers,The result of experiments shows that performance improvement can be achieved by this model,and both the elapsed time and network traffic are reduced significantly.  相似文献   

5.
When traditional Intrusion Detection System(IDS)is used to detect and analyze the great flow data transfer in high-speed network,it usually causes the computation bottleneck.This paper presents a new Mobile Agent Distributed IDS(MADIDS) system based on the mobile agents.This system is specifically designed to process the great flow data transfer in high-speed network.In MADIDS,the agents that are set at each node process the data transfer by distributed computation architecture.Meanwhile by using the reconfiguration quality of the mobile agents,the load balance of distributed computation can be dynamically implemented to gain the high-performance computing ability.This ability makes the detecting and analyzing of high-speed network possible.MADIDS can effectively solve the detection and analysis performance bottleneck caused by the great flow data transfer in high-speed network.It enhances the performance of IDS in high-speed network.In this paper,we construct the infrastructure and theoretical model of MADIDS,and the deficiencies of MADIDS and future research work are also indicated.  相似文献   

6.
A new distributed web-mining system based on CORBA (DWMBC) is proposed. It is based on web and takes advantage of CORBA for distributed processing. Distributed data processing and web mining are effectively combined to meet the demand of multi-platform in the system, and the safety and sealability of the system are reinforced. In addition, the Java technology is applied to meet the real time requirement of the presentation of the mining results. At last, a system instance is developed to implement this distributed system model.  相似文献   

7.
In the ages of current network technology, as a new technology, the emergence of mobile agent shows us a wider and wider application prospect in the fields of network technology, such as Network Management,Intelligence Information Retrieval and Electronic Commence and so on. The security is the essence of mobile agent technology. In this paper we analyze the security issues and survey some representative approaches to solve the problem in mobile agent systems. We focus on the issues about the agent's security and propose a master-slave designpattern based security model for mobile agent called SMAP(Secure Mobile Agent Platform). In the end we give anapplication example to show how to use these.  相似文献   

8.
Mobile agent has shown its promise as a powerful means to complement and enhance existing technology in various application areas. In particular, existing work has demonstrated that MA can simplify the development and improve the performance of certain classes of distributed applications, especially for those running on a wide-area, heterogeneous, and dynamic networking environment like the Internet. In our previous work, we extended the application of MA to the design of distributed control functions, which require the maintenance of logical relationship among and/or coordination of proc- essing entities in a distributed system. A novel framework is presented for structuring and building distributed systems, which use cooperating mobile agents as an aid to carry out coordination and cooperation tasks in distributed systems. The framework has been used for designing various distributed control functions such as load balancing and mutual ex- clusion in our previous work. In this paper, we use the framework to propose a novel ap- proach to detecting deadlocks in distributed system by using mobile agents, which dem- onstrates the advantage of being adaptive and flexible of mobile agents. We first describe the MAEDD (Mobile Agent Enabled Deadlock Detection) scheme, in which mobile agents are dispatched to collect and analyze deadlock information distributed across the network sites and, based on the analysis, to detect and resolve deadlocks. Then the design of an adaptive hybrid algorithm derived from the framework is presented. The algorithm can dynamically adapt itself to the changes in system state by using different deadlock detec- tion strategies. The performance of the proposed algorithm has been evaluated using simulations. The results show that the algorithm can outperform existing algorithms that use a fixed deadlock detection strategy.  相似文献   

9.
This paper focuses on entirety interpretation,representation and reconstruction of three-dimensional volume data sets based on the physical model of the data.The data model is represented by three-dimensional geometric model The surfaces inside the datafield are extracted and matched to the model surfaces in order to reconstruct the new datafield based on the model.A conclusion is drawn that physical modeling provides a good basis and approach to interpret and represent the data sets.This paper also presents a subdivision algorithm to fast trace B-spline curve and the contrary algorithms is adopted to extract the geometry feature of the curve.  相似文献   

10.
郭平  程代杰 《计算机科学》2003,30(11):40-43
As the base of intelligent system, it is very important to guarantee the consistency and non-redundancy of knowledge in knowledge database. Since the variety of knowledge sources, it is necessary to dispose knowledge with redundancy, inclusion and even contradiction during the integration of knowledge database. This paper researches the integration method based on the multi-knowledge database. Firstly, it finds out the inconsistent knowledge sets between the knowledge databases by rough set classification and presents one method eliminating the inconsistency by test data. Then, it regards consistent knowledge sets as the initial population of genetic calculation and constructs a genetic adaptive function based on accuracy, practicability and spreadability of knowledge representation to carry on the genetic calculation. Lastly, classifying the results of genetic calculation reduces the knowledge redundancy of knowledge database. This paper also presents a frameworkfor knowledge database integration based on the rough set classification and genetic algorithm.  相似文献   

11.
移动计算中基于Mobile Agent的数据库访问技术   总被引:3,自引:1,他引:3  
本文针对传统基于应用程序方式的数据库机制在移动计算环境中所存在的不足,分别提出了移动计算环境中基于Mobile Agent的集中式数据库和分布式异种数据库访问技术,并利用IBM开发的Aglets在一个宽带无线IP网络上进行了原理实验,实验结果表明这种技术在移动计算环境中明显提高了数据库访问的性能。  相似文献   

12.
基于智能Agent技术构建移动数据库系统模型的研究与实现   总被引:7,自引:0,他引:7  
现有的移动数据库体系大都是在传统的基于固定网络的分布式数据库技术的基础上进行改进,但是这些改进并不能真正满足需求,尤其是当移动用户规模变的十分巨大的时候,这些体系就会明显的暴露其缺陷。对Agent和Multi-Agent的研究近几年来已成为分布式人工智能研究的一个热点。Agent是具有拟人智能特性的、驻留与活动于客观世界中的实体。Agent技术的自主性、主动性、反应性、移动性和社会性等优良特性,使它非常适合移动计算环境,理所当然成为实现移动数据库体系的首选。该文系统、深入地研究了基于Agent的移动数据库体系的模型系统,并实现了其在移动业务处理系统中的一般应用。  相似文献   

13.
为了解决异构数据库的数据集成和共享问题,提出了一个基于移动Agent和XML的异构数据库集成模型:采用虚拟法和XML技术,建立了全局数据集成框架;同时,采用移动Agent技术,解决了局部数据库数据智能集成的问题,优化了查询处理模块,有效地提高了数据库的查询效率.  相似文献   

14.
Agent技术在Web数据仓库结构中的应用研究   总被引:1,自引:0,他引:1  
针对基于Web的数据仓库体系结构存在的问题,在该体系结构中引入软件Agent技术,运用移动Agent技术来解决传统方法难以解决的一些主要问题,提出了一种基于Agent的Web数据仓库系统体系结构。文中发挥数据仓库技术和Web技术结合的优势,重点研究了Agent技术在Web服务器端的应用,在把有用的Web数据集成并入到数据仓库中这一目前的研究热点问题中,提出了基于Agent技术将HTML页面转化为XML数据源的解决方案。此外,文章分别研究了应用服务器端和数据仓库系统中的Agent技术的应用,并提出了将Agent技术引入后实现基于Web的数据仓库体系的关键技术。  相似文献   

15.
将新型分布式处理技术——移动Agent与入侵检测融为一体,提出了一种基于移动Agent的分布式入侵检测系统(MADIDS)的结构模型,分析了各组成模块结构、功能特点及模块间的协作关系,实现了基于此结构的分布式入侵检测系统。采取了一些防范措施来保证分布式入侵检测系统自身的安全,使该系统具有良好的灵活性、鲁棒性和可扩展性。  相似文献   

16.
基于移动计算环境的特点,使传统的客户/服务器模型己不能满足需要,人们需要一种更加灵活的体系结构。近年来,关于Mobile Agent的研究引起了广泛的关注。本文提出了一个基于mobile agent的移动数据库模型和相应的体系结构。  相似文献   

17.
根据移动Agent在分布式数据查询中的优势,该文提出了一个基于移动代理的分布式信息协作查询仿真模型,有效的解决了服务端和节点端因为频繁的交互产生的带宽浪费问题,减少了系统资源的消耗,同时通过一个实时监控Agent模块提高了系统运行的安全性。  相似文献   

18.
Mobile Agent技术是随着网络应用的日益深入而发展起来的一项新兴技术。Mobile Agent技术的智能性和移动性,不仅降低了网络负载,而且提高了通信效率;此外,其支持异步自主交互、支持断连操作,具有安全性、并行性,具有学习、容错、智能化路由能力等优点,使得Mobile Agent技术在复杂的分布式问题求解方面表现出非凡的优势,因此,将Mobile Agent技术应用于数据挖掘系统中,具有很好的研究及应用前景。  相似文献   

19.
基于协同式移动Agent的分布式数据库系统研究   总被引:1,自引:0,他引:1  
CSCW通过先进的通信技术和多媒体技术建立一个支持协同工作的平台,移动Agent在网络中执行事务和信息提取工作上提供了新的方法。将CSCW和Agent的概念引入到分布式数据库中,建立一个具有群体性、交互性、协作性的分布式人机网络工作环境COMAM,通过这个网络环境的支持,不同用户对地理上分布的各种类型的数据库可以进行协同性数据库操作。  相似文献   

20.
安全问题是移动Agent技术应用发展过程中的一个重要主题,移动Agent系统面临着许多新的安全问题,而现有的基于信息城堡模型的安全安全适应移动Agent系统,如果没有适当的安全对策,Agent技术的应用将会严重受阻。本文分析了能移动Agent系统有关的安全威胁,并提出了一些相应对策,这些安全对策可以直接集成到一个Agent系统上。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号