首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 406 毫秒
1.
基于状态图的Web导航模型及其特性分析   总被引:3,自引:0,他引:3  
WWW的指数级增长和Web应用的复杂性,需要系统化的方法和模型以支持Web应用的开发,导航建模是Web应用开发的特殊需求,提出了基于状态图的Web应用的导航模型,清楚地描述了复杂、动态的Web应用的导航特性,简化了系统的维护,并提出了导航树的概念和构造算法,能够有效地分析Web应用的导航特性,如可达性、死锁等。  相似文献   

2.
基于移动Agent技术的网络管理框架结构   总被引:1,自引:0,他引:1  
该文主要讨论基于移动Agent技术的网络管理框架结构。在分析了移动Agent技术在网管环境下的应用背景和原因的基础上,详细讨论了应用移动Agent的网络管理框架结构的构成方式和运行过程,指出了在网管环境中应用移动Agent技术的优点和存在的问题,最后,提出一些可以进一步研究的方向。  相似文献   

3.
There are two main kinds of vulnerable web applications, usual applications developed with a specific aim and applications which are vulnerable by design. On one hand, the usual applications are those that are used everywhere and on a daily basis, and where vulnerabilities are detected, and often mended, such as online banking systems, newspaper sites, or any other Web site. On the other hand, vulnerable by design web applications are developed for proper evaluation of web vulnerability scanners and for training in detecting web vulnerabilities. The main drawback of vulnerable by design web applications is that they used to include just a short set of well-known types of vulnerabilities, usually from famous classifications like the OWASP Top Ten. They do not include most of the types of web vulnerabilities. In this paper, an analysis and assessment of vulnerable web applications is conducted in order to select the applications that include the larger set of types of vulnerabilities. Then those applications are enlarged with more types of web vulnerabilities that vulnerable web applications do not include. Lastly, the new vulnerable web applications have been analyzed to check whether web vulnerability scanners are able to detect the new added vulnerabilities, those vulnerabilities that vulnerable by design web applications do not include. The results show that the tools are not very successful in detecting those vulnerabilities, less than well-known vulnerabilities.  相似文献   

4.
为了有效共享普适计算环境中分布、异构的应用资源,提出了一种以用户为中心的应用共享模型U-ASM,定义了U-ASM 的基本概念和结构,从用户、服务提供者等不同层面对应用资源进行抽象;利用应用资源的语义关系,对应用资源进行语义建模,通过虚拟化技术构建应用资源的逻辑视图;通过应用资源共享原型,验证了模型的可行性和有效性.该成果已应用于国家科技基础条件平台建设计划,灵活性和扩展性良好.  相似文献   

5.
The Journal of Supercomputing - Understanding I/O for data-intense applications is the foundation for the optimization of these applications. The classification of the applications according to the...  相似文献   

6.
Computer scientists who work on tools and systems to support eScience (a variety of parallel and distributed) applications usually use actual applications to prove that their systems will benefit science and engineering (e.g., improve application performance). Accessing and building the applications and necessary data sets can be difficult because of policy or technical issues, and it can be difficult to modify the characteristics of the applications to understand corner cases in the system design. In this paper, we present the Application Skeleton, a simple yet powerful tool to build synthetic applications that represent real applications, with runtime and I/O close to those of the real applications. This allows computer scientists to focus on the system they are building; they can work with the simpler skeleton applications and be sure that their work will also be applicable to the real applications. In addition, skeleton applications support simple reproducible system experiments since they are represented by a compact set of parameters.Our Application Skeleton tool (available as open source at https://github.com/applicationskeleton/Skeleton) currently can create easy-to-access, easy-to-build, and easy-to-run bag-of-task, (iterative) map-reduce, and (iterative) multistage workflow applications. The tasks can be serial, parallel, or a mix of both. The parameters to represent the tasks can either be discovered through a manual profiling of the applications or through an automated method. We select three representative applications (Montage, BLAST, CyberShake Postprocessing), then describe and generate skeleton applications for each. We show that the skeleton applications have identical (or close) performance to that of the real applications. We then show examples of using skeleton applications to verify system optimizations such as data caching, I/O tuning, and task scheduling, as well as the system resilience mechanism, in some cases modifying the skeleton applications to emphasize some characteristic, and thus show that using skeleton applications simplifies the process of designing, implementing, and testing these optimizations.  相似文献   

7.
动态图编辑器框架设计与实现   总被引:1,自引:0,他引:1  
从具体的应用中抽象出适用于动态处理的图编辑器框架,并在此基础上利用JAVA技术构造动态图编辑器API。它的开放结构允许应用程序在运行时,使其一方面能够独立于应用程序,维护其自身的稳定性,另一方面又能够和应用程序有机地结合在一起。它的模块化结构为应用程序提供了不同层次的切入点。动态图编辑器框架作为可重用的设计,能够对相关领域图应用软件的研制起指导作用,在此基础上建立的图应用软件不但具有易扩展与维护的特点,而且可以在较短的时间内完成。  相似文献   

8.
Linux应用二进制兼容技术研究与实现   总被引:1,自引:0,他引:1  
黄进  卢凯  廖湘科 《计算机工程》2004,30(16):96-98
应用数量的多少是决定一个操作系统生命力的重要因素。二进制兼容Linux应用可以有效扩展自主服务器操作系统的应用范围,提高其生命力。该文介绍了自主服务器操作系统CSD863实现Linux应用二进制兼容的主要技术途径,包括二进制应用类型识别与加载技术、系统调用仿真技术等。  相似文献   

9.
.NET环境下Web应用的通用设计   总被引:2,自引:1,他引:2  
Microsoft的.NET和Sun的J2EE是目前建立和开发各种Web应用的两大主流平台。针对J2EE,人们已经提出了许多设计模式;针对.NET,目前这方面的研究并不多。其实,J2EE的设计模式并不完全适用于.NET。采用5层架构的设计模式,提出了一种.NET环境下Web应用开发的通用设计方案。该方案具有结构清晰、可重用,挂好、可伸缩性强和运行效率高等特点,已成功地应用于多个大型Web应用项目。  相似文献   

10.
Practical applications of constraint programming   总被引:1,自引:1,他引:0  
Mark Wallace 《Constraints》1996,1(1-2):139-168
Constraint programming offers facilities for problem modelling, constraint propagation and search. This paper discusses the resulting benefits for practical applications which exploit these facilities.The modelling facilities are particularly exploited in applications to verification, both of circuits and of real time control systems. The propagation facilities are exploited in applications involving user feedback and graphical interfaces. The search facilities are exploited in applications such as scheduling and resource allocation, which involve combinatorial problems.The paper surveys applications under each of these three headings.  相似文献   

11.
Many enterprises rely on a wide variety of collaborative applications in order to support their everyday activities and to share resources. The collaborative applications are typically designed from scratch if the existing applications do not meet the enterprise's evolving needs. This incurs significant costs, and inconvenience. In this paper we present a case study of six applications (Sage 200, Gold-Vision CRM system, E-Commerce System, Gold-Vision Connect System, Realex Transaction and Spindle Document Automation Tool) within an enterprise. These applications are working in isolation. Therefore, sharing of information and data among these applications is carried out manually which imposes additional burden on their users and causes performance degradation. In this paper, we address this problem by integration and optimization of these applications by applying Service-Oriented Architecture (SOA) approach. We also address the usability problems of these applications. We present comparative evaluation results that show significant improvement in ease and performance of user tasks using integrated applications.  相似文献   

12.
像其他组织一样,IT服务提供者通过服务管理应用软件对内部业务过程提供支持。随着时间的推移,业务过程会发生改变,而管理应用软件必须能够灵活地适应这种变化。文章描述了一种方法,这种方法使用面向服务的架构将管理应用软件集成起来,阐述了如何根据业务过程松散地集成管理应用软件。  相似文献   

13.
Soft computing (SC) is a field of computer science that resembles the processes of the human brain. While conventional hard computing is run based on crisp values and binary numbers, SC uses soft values and fuzzy sets. In fact, SC technology is capable of address imprecision and uncertainty. The application of SC techniques in the mining industry is fairly extensive and covers a considerable number of applications. This paper provides a comprehensive overview of the published work on SC applications in different mining areas. A brief introduction to mining and the general field of SC applications are presented in the first section of the paper. The second section comprises four review chapters. Mining method selection, equipment selection problems and their applications in SC technologies are presented in chapters one and two. Chapter three discusses rock mechanics-related subjects and some of representative SC applications in this field. The last chapter presents rock blasting related SC applications that include blast design and hazards. The final section of the paper comments on the use of SC applications in several mining problems and possible future applications of advanced SC technologies.  相似文献   

14.
研究科学计算应用在流处理器上的适用性已成为当前研究热点之一。本文首先分析了流处理器处理科学计算应用的优势以及在流处理器上开发科学计算面临的重大挑战;然后针对不同类型的科学计算应用给出了将科学计算应用映射到流处理器上的关键与优化方法;最后将八种具有不同性能特征的典型科学计算应用映射到流处理器上,并比较和分析这些流程序在时钟精确模拟器运行性能和在处理科学计算应用的相应Fortran程序在主流Itanium 2处理器上的运行性能。实验结果表明,流处理器能有效处理科学计算应用。  相似文献   

15.
SOA的目标是把各个应用程序集成为一个无缝的整体,SOA中的应用是一套可重复使用的服务,通过组合这些服务可以很容地搭建功能完善的企业应用,或者通过重新组合这些服务构建全新的应用来满足企业不断变化的需求.  相似文献   

16.
Dance notation systems, like music notes, enable documentation of symbolic representations of movement as signs on paper for individual analysis and interpretation. Today, dance notation systems operate within a digital environment in dance notation applications that facilitate the process of recording movement. The author argues that a key objective in the development of these applications should be to provide the user with an unambiguous method to record and represent movement. These applications offer varying functionality in their use of technology for the representation of movement and can be broadly defined in three different categories. Dance notation applications make up the first category - they help notate or record specific forms of movement using dance notation. Notation-based applications, the second category, include applications that use dance notation as a basis for their development. The last category, dance technology, consists of applications that use emerging technologies to record and visualize movement. While each application has a defined use, it's important to consider how effective the technologies they employ are in successfully achieving their objectives. In this article, the author focuses on dance applications in these three categories. The author considers the limitations of existing technologies in their ability to effectively describe and record movement within a specific context.  相似文献   

17.
随着Internet的发展,Web应用也得到了快速发展和广泛普及.同时这也给Web应用开发提出了新的要求.与传统应用程序开发相比,Web应用开发具有如下特点:开发周期短,开发成本高,实现技术复杂.为了适应Web应用开发的新特点,开发人员需要一种可以快速开发Web应用的工具.本文介绍了一种J2EE平台上动态HT-ML表格的设计和实现.开发者可以使用该工具定义一个和数据库相联系的动态HTML表格.这个工具可以根据用户的定义自动生成相应的Servlet代码.  相似文献   

18.
As smartphones are now widely used, new types of mobile donation applications have emerged. These new types of mobile donation applications transform giving into easy and convenient activities without interfering in users’ daily schedules, and they enable users to keep donating. However, there is still a lack of research on these new types of mobile donation applications as a new venue of technology-mediated civic engagement. The purpose of this article is to investigate the important factors that affect people’s continuance intention to use mobile donation applications. Based on previous studies of cause-related marketing, this study identifies four attributes—type-cause fit, name-cause fit, cause involvement, and perceived effectiveness—that play an important role in mobile donation applications. Our survey results show that all four attributes have significant positive impacts on users’ willingness to use mobile donation applications. The results of this study contribute to mobile application and donation research and provide guidelines for practitioners on the design and creation of mobile donation applications.  相似文献   

19.
李中  王刚  刘璟 《计算机研究与发展》2006,43(11):2027-2032
多媒体应用要求存储系统提供保证服务质量的数据访问服务,响应时间超过延迟上限的访问请求必须小于一定的比例.基于服务质量需求的动态优先权调度策略(QADPS)根据多媒体应用接受存储系统服务的历史信息,计算多媒体应用的服务质量失败距离;并为失败距离较小的多媒体应用分配较高的调度优先权.QADPS根据多媒体应用的不同服务质量需求,实现了有差别的调度:多媒体应用的服务质量需求越严格,它的访问请求被调度的机会越高.QADPS能够在保证服务质量的前提下,支持更多的并发多媒体应用.  相似文献   

20.
随着经济社会的快速发展,互联网黑色产业(也称互联网地下产业,以下简称网络黑产)对人民群众的生产生活带来的影响也在快速扩大.近年来,移动互联网的兴起使以诈骗、博彩和色情为主的网络黑产移动应用(APP)变得更加猖獗,亟待采取有效措施进行管控.目前研究人员针对黑产应用的研究较少,其原因是由于执法部门持续对传统黑产应用分发渠道的打击,已有的通过基于搜索引擎和应用商店的采集方法的效果不佳,缺乏大规模具有代表性的在野黑产应用数据集已经成为开展深入研究的一大掣肘.为此,本文尝试解决在野黑产应用大规模采集的难题,为后续深入全面分析黑产应用及其生态提供数据支撑.本文提出了一种基于突变流量分析的黑产应用批量捕获方法,以黑产应用分发的关键途径为抓手,利用其具有的突变和伴随流量特点,批量快速发现正处于传播阶段的新兴在野黑产应用,为后续实时分析和追踪提供数据基础.在测试中,本方法成功获取了3,439条应用下载链接和3,303个不同的应用.捕获的移动应用中,不但有91.61%的样本被标记为恶意软件,更有98.14%的样本为首次采集发现的零天应用.上述结果证明了本文提出的方法在黑产应用采集方面的有效性.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号