共查询到20条相似文献,搜索用时 234 毫秒
1.
2.
网络游戏安全登录环境的研究与设计 总被引:1,自引:0,他引:1
随着网络游戏的日益流行,如何保护虚拟财产的安全成为玩家和游戏公司共同关注的热点。冒充受害者身份骗取游戏登录服务器的信任是盗号者经常使用的方法,因此安全登录技术是防止游戏账号被盗用的主要手段。安全登录环境是一种基于环境监测的安全登录体系架构,用于在不可靠的公共环境中抵制各类盗号手段,解决安全登录的问题。该方法可以由第三方公司开发,并与任何网络游戏进行融合,具有简单有效的商业应用价值。 相似文献
3.
Cocos-2d是一种跨平台的游戏架构引擎方式,对于底层的TCP/IP网络协议有很好的支持,其本身的内存管理机制及消息分发机制能够实现快速的高性能网络游戏架构。本文研究了现有的Cocos-2d引擎架构,并在此基础上封装了API接口来增加扩平台之间的通用性;同时,构架了基于客户端/服务端的Cocos-2d底层网络收发模块,最后进行了验证。 相似文献
4.
5.
《电子技术与软件工程》2017,(9)
为了运行期货交易策略,同时又能实现自主的交易行为,本文讨论了一种组合型架构的期货程序化交易系统。该系统实现了策略端和交易端的独立,策略端负责接收行情数据并产生交易信号,交易端完成交易行为并进行风险控制。策略端采用"交易师"作为第三方通用平台,交易端采用C++编程,并使用QDP作为底层API接口。目前该系统已经开发完成,实际效果良好。 相似文献
6.
本文基于培训机构微信公众号管理系统的需求分析,比较了国内外流行的几种MVC框架,选择ThinkPHP框架进行架构设计,封装微信公众号接口、通过第三方开发,接管并响应用户在微信公众号的操作,从而增强了功能,提高了开发效率、缩短开发工期并节约开发成本,具有普遍的应用价值. 相似文献
7.
Android平台的即时通信系统客户端设计方案 总被引:5,自引:0,他引:5
为解决在基于Linux操作系统的Android手机平台上即时通信问题,实现在系统客户端进行文本、图片、音乐的传送和播放。采用Java语言环境下Android应用开发工具和API接口,并使用Eclipse加上Android集成开发环境插件为手段,对客户端架构、应用模块框架、数据存储、主要功能和核心模块开发技术等全方面分析,从而提供了实现即时通信系统的客户端解决方案。 相似文献
8.
9.
软件定义网络(SDN)通过将控制平面与数据平面分离并使网络可编程来改变网络的管理方式。控制器是SDN网络的关键组成部分。对于诸如DHCP中继功能、动态路由功能等传统网络功能,目前已存在成熟的第三方网络组件。基于能够更便捷地开发面向SDN的传统网络应用,设计与实现一种通用的传统网络功能集成方法,该方法通过将底层网络流量同步给第三方网络组件,由第三方网络组件完成核心的网络功能。文中基于ONOS控制器利用该集成方法开发了一款通用的传统网络应用,并通过集成DHCP Relay功能的实验完成了对该集成方法的功能性验证。 相似文献
10.
在WEB开发管理信息系统的过程中,应用三层架构能很好地实现客户端功能的分离。在分析三层架构内部的关系后,提出了用户服务系统的总体设计方案,同时对系统功能模块和系统的实现过程以及相关技术进行了详细的介绍。 相似文献
11.
Sipper M. Azaria Y. Hauptman A. Shichel Y. 《IEEE transactions on systems, man and cybernetics. Part C, Applications and reviews》2007,37(4):583-593
We have shown that genetically programming game players, after having imbued the evolutionary process with human intelligence, produces human-competitive strategies for three games: backgammon, chess endgames, and robocode (tank-fight simulation). Evolved game players are able to hold their own - and often win - against human or human-based competitors. This paper has a twofold objective: first, to review our results of applying genetic programming in the domain of games; second, to formulate the merits of genetic programming in acting as a tool for developing strategies in general, and to discuss the possible design of a strategizing machine. 相似文献
12.
13.
The chess program “Cray Blitz” is the current World Computer Chess Champion and North American Computer Chess Champion (ACM). The program has also played in human chess tournaments and is a chess master. At speed chess, where its ability to perform very accurate analysis is particularly important, it has maintained a performance rating of over 2600 for the past two years. This indicates that at speed chess, the program is one of the top players, electronic or human, in the world. It is currently running on a Cray XMP-48 computer system and has been designed around the parallelism that the XMP architecture provides. 相似文献
14.
We propose a generalization of the architecture of an electronic wallet, as first developed in the seminal European research project CAFE. With this model you can leave most of the content of your electronic wallet at the security of your residential electronic keeper, while roaming with your favorite mobile terminals. Emerging mobile handsets with both short range Bluetooth and cellular GPRS communications provide a sufficient communication platform for this electronic wallet architecture. However, new security requirements must be addressed, and new threats of attack must be carefully analyzed and met with appropriate security protocols. The proposed approach is fundamentally distinct from the remote wallet proposals, in that it protects important user requirements and takes a multiparty security approach using a fully decentralized architecture. Technically, the user remains in control of the input/output and usage of his credentials, likely carried by smart cards. At the same time, the model provides a solution to the pressing practical problem of the multitude of special-branded cards the user has to carry and sort. Currently used magnetic stripe and chip cards with applications such as debit and credit transactions are easily included within the architecture with minor enhancement to these legacy systems and their functionality. We show in this paper how an account-based payment system can be solved with the proposed architecture. Our claim is that users achieve payment mobility and independence of both terminals and payment service providers while maintaining secure access to their payment authorization credentials. 相似文献
15.
Se-Jeong Park Jeong-Su Kim Ramchan Woo Se-Joong Lee Kang-Min Lee Tae-Hum Yang Jin-Yong Jung Hoi-Jun Yoo 《Solid-State Circuits, IEEE Journal of》2002,37(5):612-623
Recently, the level of realism in PC graphics applications has been approaching that of high-end graphics workstations, necessitating a more sophisticated texture data cache memory to overcome the finite bandwidth of the AGP or PCI bus. This paper proposes a multilevel parallel texture cache memory to reduce the required data bandwidth on the AGP or PCI bus and to accelerate the operations of parallel graphics pipelines in PC graphics cards. The proposed cache memory is fabricated by 0.16-μm DRAM-based SOC technology. It is composed of four components: an 8-MB DRAM L2 cache, 8-way parallel SRAM L1 caches, pipelined texture data filters, and a serial-to-parallel loader. For high-speed parallel L1 cache data replacement, the internal bus bandwidth has been maximized up to 75 GB/s with a newly proposed hidden double data transfer scheme. In addition, the cache memory has a reconfigurable architecture in its line size for optimal caching performance in various graphics applications from three-dimensional (3-D) games to high-quality 3-D movies 相似文献
16.
针对现有信令数据采集技术所面临的海量数据采集需求以及存储困难等问题,文中研究了基于大数据平台的信令数据采集技术。设计了基于大数据平台的信令监测系统架构,并分析了信令监测系统的大数据解决方案。另外,文中进一步划分了基于大数据平台的信令数据采集架构,主要包括大数据信令采集架构、大数据信令采集模式以及大数据信令采集内容3部分。所设计的面向大数据平台的信令数据采集技术架构可以有效适用于海量信令数据采集场景,为实现大规模分布式信令数据采集提供了工具。 相似文献
17.
18.
Networked computer games have come of age in recent years, due to a combination of increased graphical sophistication and simplified networking in consumer level computer equipment.This paper presents an overview of a new network game genre, the virtual environment based multi-user dungeon. It reviews the technical requirements necessary to deliver successful games of this type, and outlines a suggested architecture. Issues addressed in the architecture include scalability, persistence and consistency. 相似文献
19.
20.
描述了蓝牙安全机制的构建及不同应用过程中不同的安全等级,介绍了蓝牙规范中不同层次上的多种安全运行机制,并提出了蓝牙可能受到攻击的缺陷及解决方法。 相似文献