首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 93 毫秒
1.
To solve the problem of information interdiction among various kinds of DCS and systems of MIS and ERP, through using a kind of universal Web services object's encapsulation technique, a Web services-oriented DCS data exchanging platform is constructed, and the functional architecture and Key Enabling Technologies of the platform are introduced in detail. Accordingly, the enterprise information integration across different platforms and languages is realized, and an open, unified application integration environment is provided for the heterogeneous control systems and management systems.  相似文献   

2.
《计算机科学技术学报》2014,(3):F0003-F0003
Introduction
Research on computer architecture and systems is typically driven by technology and applications. Big data has emerged as an important application domain which has shown its huge impact on scientific research, business, and society. Big data is known for its large volume, high velocity, and a variety of formats. The collection, storage, retrieval, processing, and visualization of big data issues many challenges to computer architecture and systems. This special section is an effort to encourage and promote research to address the big data challenges from the computer architecture and systems perspectives.  相似文献   

3.
In this paper, a model-free approach is presented to design an observer-based fault detection system of linear continuoustime systems based on input and output data in the time domain. The core of the approach is to directly identify parameters of the observer-based residual generator based on a numerically reliable data equation obtained by filtering and sampling the input and output signals.  相似文献   

4.
基于配置管理系统的软件过程管理机制研究   总被引:3,自引:0,他引:3  
Sohware processes are a group of relating activities in the lifecycle of software. Process man-agement is the central technique in software developing and maintaining. Based on configuration man-agement system that manages tht: resource of an enterprise ,process management will be more effective.This paper discusses the issues of process managementtask, rule and role. Based on the discussions, we makemanagementin configuration management systems, such assome study on mechanisms of computer aided  相似文献   

5.
With the convergence of high-performance computing(HPC),big data and artificial intelligence(AI),the HPC community is pushing for"triple use"systems to expedite scientific discoveries.However,supporting these converged applications on HPC systems presents formidable challenges in terms of storage and data management due to the explosive growth of scientific data and the fundamental differences in I/O characteristics among HPC,big data and AI workloads.In this paper,we discuss the driving force behind the converging trend,highlight three data management challenges,and summarize our efforts in addressing these data management challenges on a typical HPC system at the parallel file system,data management middleware,and user application levels.As HPC systems are approaching the border of exascale computing,this paper sheds light on how to enable application-driven data management as a preliminary step toward the deep convergence of exascale computing ecosystems,big data,and AI.  相似文献   

6.
基于多级存储结构的海量信息管理系统的研究   总被引:2,自引:0,他引:2  
It is very important for such large-scale application systems as global information systems,GIS,digital libraries,data warehousing to effectively manage and manipulate the large volumes of infor-mation(more than terabytes of data). One of challenge problems is to study massive information man-agement system and related techniques. Since the large volumes of information are mainly stored on ter-tiary storage devices,the study of massive information management system should focus on the follow-ing aspects. (l)the multilevel storage architecture in which the tertiary storage devices are main datamedia and the secondary storage devices are data cache; (2)scalable system architecture of massive in-formation management system; (3)retrieve process techniques. This paper will deeply study and discussthe above oroblems.  相似文献   

7.
Currently many enterprises have established some independent application systems such as CAD, CAPP, CAE and so on. Enterprise information integration makes these information islands connected, and thereby forms a uniform enterprise-wide information environment. First this paper discusses the main research contents of enterprise integration. Then the author introduces an Internet-based configurable and open information integration framework, and presents a multi-tier integration architecture based on reusable component. Finally a development case of enterprise integration framework is introduced.  相似文献   

8.
The lifting technique is now a well recognized tool for H_∞design and analysis of sampled- data systems.However,the efficiency of the method depends on the structure of the problem.The structure of the H_∞sensitivity problem is analyzed in this paper.And the constraints on the H_∞-optimization problem and on the design parameters in lifting design are also discussed.Under such constraints the resulting performance from the design is generally low.Therefore,the lifting technique can not be recommended as a synthesis tool for the sampled-data systems.An example is also given in the paper.  相似文献   

9.
In recent years there has been a significant interest in peer-to-peer (P2P) environments in the community of data management. However, almost all work, so far, is focused on exact query processing in current P2P data systems. The autonomy of peers also is not considered enough. In addition, the system cost is very high because the information publishing method of shared data is based on each document instead of document set. In this paper, abstract indices (AbIx) are presented to implement content-based approximate queries in centralized, distributed and structured P2P data systems. It can be used to search as few peers as possible but get as many returns satisfying users' queries as possible on the guarantee of high autonomy of peers. Also, abstract indices have low system cost, can improve the query processing speed, and support very frequent updates and the set information publishing method. In order to verify the effectiveness of abstract indices, a simulator of 10,000 peers, over 3 million documents is made, and several metrics are proposed. The experimental results show that abstract indices work well in various P2P data systems.  相似文献   

10.
An encoding method has a direct effect on the quality and the representation of the discovered knowledge in data mining systems. Biological macromolecules are encoded by strings of characters, called primary structures. Knowing that data mining systems usually use relational tables to encode data, we have then to reencode these strings and transform them into relational tables. In this paper, we do a comparative study of the existing static encoding methods, that are based on the Biologist know-how, and our new dynamic encoding one, that is based on the construction of Discriminant and Minimal Substrings (DMS). Different classification methods are used to do this study. The experimental results show that our dynamic encoding method is more efficient than the static ones, to encode biological macromolecules within a data mining perspective.  相似文献   

11.
基于"本体"的异构数据源的集成方法研究   总被引:2,自引:9,他引:2  
本文给出了一种基于本体的异构数据源的集成方案,该方案从根本上解决了企业内部数据源的语法异构和语义异构;同时,也为企业内部的信息及时而准确地实现共享,提供了一套行之有效的技术措施.  相似文献   

12.
Lou  Yabin Tao  Fengmei Ma  Yuan 《微计算机信息》2005,21(10X):119-121
This paper provides an integration scheme of heterogeneous data source based on ontology, and this scheme settles basically syntactic and semantic heterogeneity in heterogeneous data sources; meanwhile, it provides an effective technology measure for the interior information of enterprises to be shared in time accurately.  相似文献   

13.
电子公文中多人签名的设计与实现   总被引:1,自引:0,他引:1  
基于XML提出一种新的多人数字签名方案,能够实现多人数字签名以及多方的不可否认性,基于该多人数字签名方案用Java实现了一个电子公文签发系统。  相似文献   

14.
Eswaran, Hamacher, and Shedler have proposed an access control scheme for a local area bus network. The control scheme is simple and asynchronous, and provides for collision-free communication among ports of the network. It is also efficient in the use of the bus bandwidth in the sense that there is only a small fraction of time during which the bus is idle when there is at least one packet available for transmission. Emphasizing the characteristics of bus access response times at the individual ports, this paper provides an analysis of the performance of the control scheme.  相似文献   

15.
一个前向安全的基于身份的代理签密方案   总被引:4,自引:1,他引:3       下载免费PDF全文
借鉴Chen和Malone-Lee提出的基于身份的签密方案的思想,利用双线性对的特性构建出一个基于身份的代理签密方案。该方案既保持了基于身份签密的优点,又具有代理签名的功能,只有指定的接收者才能从密文中恢复消息,验证代理签名的有效性。与已有的方案相比,该方案同时具有前向安全性和公开验证性;并且新方案更适于应用。  相似文献   

16.
Deniable authentication scheme is one of useful tools for secure communications. The scheme allows a sender to prove the authenticity of a message to a specified receiver without permitting the receiver to prove that the message was authenticated by the sender. Non-interactive schemes are more attractive than interactive schemes in terms of communication overhead, and thus several non-interactive deniable authentication scheme have been proposed. In this paper, we propose an efficient non-interactive deniable authentication scheme based on trapdoor commitment scheme. We construct an efficient trapdoor commitment scheme which provides very efficient commitment evaluation operation. Then we design an efficient non-interactive deniable authentication scheme by using the trapdoor commitment scheme. We also prove the security of our scheme under firmly formalized security model.  相似文献   

17.
李雄  李志慧  于静 《计算机工程》2008,34(24):160-161
YCH方案是一个基于二元单向函数和Shamir(t,n)门限方案的有效多秘密共享方案,但其不具有可验证性。该文基于YCH方案、RSA密码体制和离散对数问题,提出一个可验证的多秘密共享方案,使YCH方案保留原有性质的同时实现了可验证性。该方案中参与者的秘密份额由自己选择产生且无需安全信道,有较强的实用价值。  相似文献   

18.
Hsu、Cheng、Tang和Zeng基于单调张成方案设计了一个理想的多秘密共享方案(HCTZ方案),但该方案不具有可验证性。基于单调张成方案和双变量单向函数,提出了一个新的理想的多秘密共享方案。新方案通过增加每个密钥的维数,在保留HCTZ方案原有性质的同时实现了可验证性。该方案的安全性得到证明,且具有较强的实用价值。  相似文献   

19.
一种基于门限ECC的入侵容忍CA方案   总被引:15,自引:1,他引:14  
门限密码学提供了建立入侵容忍应用的新方法。文中在介绍并分析了基于ECC的E1Gamal数字签名方案和t—out—of-n秘密共享方案的基础上,提出了一个基于ECC的零知识证明方法和一个基于.ECC的门限数字签名方案;研究了该方法和方案在建立入侵容忍CA中的应用。最后,对比ITTC项目中关于入侵容忍CA设计的方案,分析显示该方案在安全性、效率和可用性方面具有良好的性能。  相似文献   

20.
将前向安全的概念结合到代理签名体制中,利用椭圆曲线上的双线性对构造了一个基于双线性对的前向安全代理签名方案。此方案保护了原始签名者和代理签名者权益,攻击者即使在本时段入侵,也无法伪造过去时段的签名,有较高的效率和较强的安全性。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号