共查询到20条相似文献,搜索用时 93 毫秒
1.
基于图论的网络安全分析方法研究与应用 总被引:5,自引:0,他引:5
当前,对网络的安全状况进行定量分析和预警日益显得重要,文中通过对漏洞库中的大量漏洞信息进行分析,提出对网络安全脆弱性的威胁程度进行定量分析的层次分析模型和指标体系,采用图论的方法对各种安全脆弱性信息进行关联分析,并在此基础上构造入侵关系图模型,给出基于入侵关系图的网络安全威胁分析方法,最后对整个网络安全分析评估系统的实现原型进行了分析。 相似文献
2.
3.
本文在对UML作了简要的介绍和概述后,对教务管理系统的需求和目标进行了分析,介绍了运用UML进行建模的步骤,并对教务管理系统运用UML进行了分析和设计,总结了运用UML建模的优势。 相似文献
4.
针对微器件产品优化评价规则缺乏的现状,采用现代设计方法对微器件优化决策规则进行了研究,有限元方法被用于对微器件进行动态分析,获取大量的信息数据;粗糙集理论和遗传算法被用于属性约简和优化决策规则提取,根据以上方法对相应原型软件进行开发,对热驱动微泵实例进行应用示范,为微器件优化决策规则制定提供了方法和原型软件。 相似文献
5.
6.
7.
“电子警察”技术的发展和系统的扩展,到今天,各城市每天会采集大量的交通违法数据,原有的系统是难以对这些数据进行处理和管理,需要用新的系统来对这些数据进行管理。本文通过对广州市“电子警察”管理信息系统的现状及其存在问题进行了分析和探讨,并对系统体系架构和实现手段进行了研究,以供大家商榷。 相似文献
8.
卫星网络协议的仿真与模拟技术研究 总被引:4,自引:0,他引:4
本文主要对卫星网络中有关协议的模拟与仿真方法进行了研究。首先,对卫星网络中有关协议模拟与仿真的主要内容和指标进行了说明,接着对当前流行的卫星网络模拟仿真工具进行了介绍,然后对仿真工具的工作原理和工作方法进行了简单的解释,最后给出了使用模拟工具模拟卫星网络中路由协议的结果,并对构建自主仿真平台进行了探讨。 相似文献
9.
10.
11.
Fault-Tolerant Hamiltonicity and Hamiltonian Connectivity of BCube with Various Faulty Elements
下载免费PDF全文
![点击此处可从《计算机科学技术学报》网站下载免费的PDF全文](/ch/ext_images/free.gif)
BCube is one kind of important data center networks. Hamiltonicity and Hamiltonian connectivity have significant applications in communication networks. So far, there have been many results concerning fault-tolerant Hamiltonicity and fault-tolerant Hamiltonian connectivity in some data center networks. However, these results only consider faulty edges and faulty servers. In this paper, we study the fault-tolerant Hamiltonicity and the fault-tolerant Hamiltonian connectivity of BCube(n, k) under considering faulty servers, faulty links/edges, and faulty switches. For any integers n ≥ 2 and k ≥ 0, let BCn,k be the logic structure of BCube(n, k) and F be the union of faulty elements of BCn,k. Let fv, fe, and fs be the number of faulty servers, faulty edges, and faulty switches of BCube(n, k), respectively. We show that BCn,k-F is fault-tolerant Hamiltonian if fv + fe + (n-1)fs ≤ (n-1)(k + 1)-2 and BCn,k-F is fault-tolerant Hamiltonian-connected if fv + fe + (n-1)fs ≤ (n-1)(k + 1)-3. To the best of our knowledge, this paper is the first work which takes faulty switches into account to study the fault-tolerant Hamiltonicity and the fault-tolerant Hamiltonian connectivity in data center networks. 相似文献
12.
A heap structure designed for secondary storage is suggested that tries to make the best use of the available buffer space in primary memory. The heap is a complete multi-way tree, with multi-page blocks of records as nodes, satisfying a generalized heap property. A special feature of the tree is that the nodes may be partially filled, as in B-trees. The structure is complemented with priority-queue operations insert and delete-max. When handling a sequence of S operations, the number of page transfers performed is shown to be O(∑i = 1S(1/P) log(M/P)(Ni/P)), where P denotes the number of records fitting into a page, M the capacity of the buffer space in records, and Ni, the number of records in the heap prior to the ith operation (assuming P 1 and S> M c · P, where c is a small positive constant). The number of comparisons required when handling the sequence is O(∑i = 1S log2 Ni). Using the suggested data structure we obtain an optimal external heapsort that performs O((N/P) log(M/P)(N/P)) page transfers and O(N log2 N) comparisons in the worst case when sorting N records. 相似文献
13.
Carsten W. Scherer 《Systems & Control Letters》1995,25(5):327-335
For arbitrary equally sized square complex matrices A and Q (Q Hermitian), the paper provides a complete algebraic test for verifying the existence of a Hermitian solution X of the nonstrict Lyapunov inequality A*X + XA + Q 0. If existing, we exhibit how to construct a solution. Our approach involves the validation problem for the linear matrix inequality Σj=1k (Aj*XjBj + Bj*Xj*Aj) + Q> 0 in Xj, for which we provide an algebraic solvability test and a construct solutions if the kernels of Aj or, dually, those of Bj form an isotonic sequence. 相似文献
14.
基于中间件的信息系统安全解决方案 总被引:1,自引:0,他引:1
C/S结构与B/S结构各有优缺点,怎样结合B/S与C/S结构是开发MIS(Management Information System)普遍关注的问题。在实际应用中,两种结构的有机结合,可以扬长避短,有效地发挥了各自的优势。随着信息系统规模的不断扩大和互联网技术的发展,多层体系结构B/W/S/S、C/S/S应运而生,同时,B/W/S/S与C/S/S混合结构下信息系统的安全性也受到威胁。在综合分析了B/W/S/S和C/S/S混合结构信息系统模式的基础上,提出了一种基于中间件的C/S/S与B/W/S/S混合模型的MIS安全解决方案。 相似文献
15.
Let X1,…, Xr+1 be independent random variables, XiGa (ai, θ, δi), i = 1,…, r + 1. Define and Vi = Xi/Xr+1, i = 1,…, r. Then, (U1,…, Ur) and (V1,…, Vr) follow noncentral Dirichlet Type 1 and Type 2 distributions, respectively. In this article several properties of these distributions and their connections with the uniform, the noncentral multivariate-F and the noncentral multivariate-t distributions are discussed. 相似文献
16.
Herbert E. Salzer 《Computers & Mathematics with Applications》1984,10(6):433-439
A previous application of the Newton divided difference series of the displacement function Ez = (1 + Δ)z = e Dz, where the operators Δ and D are the variables, to purely exponential interpolation employing general-factorial differences and derivatives, {Pi;mi=0 (Δ - Si)}f(0) and {Pi;mi=0 (D - ti)}f(0), in which the si's and ti's are distinct[1], is here extended to mixed polynomial-exponential interpolation where the si's and ti's are no longer distinct. 相似文献
17.
Efficient algorithms for the all nearest neighbor and closest pair problems on the linear array with a reconfigurable pipelined bus system 总被引:1,自引:0,他引:1
Yuh-Rau Wang Shi-Jinn Horng Chin-Hsiung Wu 《Parallel and Distributed Systems, IEEE Transactions on》2005,16(3):193-206
We present two O(1)-time algorithms for solving the 2D all nearest neighbor (2D/spl I.bar/ANN) problem, the 2D closest pair (2D/spl I.bar/CP) problem, the 3D all nearest neighbor (3D/spl I.bar/ANN) problem and the 3D-closest pair (3D/spl I.bar/CP) problem of n points on the linear array with a reconfigurable pipelined bus system (LARPBS) from the computational geometry perspective. The first O(1) time algorithm, which invokes the ANN properties (introduced in this paper) only once, can solve the 2D/spl I.bar/ANN and 2D/spl I.bar/CP problems of n points on an LARPBS of size 1/2n/sup 5/3+c/, and the 3D/spl I.bar/ANN and 3D/spl I.bar/CP problems pf n points on an LARPBS of size 1/2n/sup 7/4+c/, where 0 < /spl epsi/ = 1/2/sup c+1/-1 /spl Lt/ 1, c is a constant and positive integer. The second O(1) time algorithm, which recursively invokes the ANN properties k times, can solve the kD/spl I.bar/ANN, and kD/spl I.bar/CP problems of n points on an LARPBS of size 1/2n/sup 3/2+c/, where k = 2 or 3, 0 < /spl epsi/ = 1/2/sup n+1/-1 /spl Lt/ 1, and c is a constant and positive integer. To the best of our knowledge, all results derived above are the best O(1) time ANN algorithms known. 相似文献
18.
在进行多项AM/FM/GIS应用系统建设实践和对AM/FM/GIS的深入研究的基础上,阐述了AM/FM/GIS的特点,指出了当前AM/FM/GIS建设过程中存在的一系列问题,并从AM/FM/GIS标准,平台建设,模型集成,知识与规则的应用,多层体系结构,分布式计算等几个方面对AM/FM/GIS进行了较为详细的探讨,提出了解决相关问题的思路。 相似文献
19.
Let Ak,l,Ek,l denote the acceptance and error rates in the (k,l) case of the nearest neighbour decision rule. We show that if q>k and Aq,m = Ak,l then Eq,m ≤ Ek,l. 相似文献
20.
Wai-Fong Chuan 《Theoretical computer science》2004,310(1-3):273-285
For each nonempty binary word w=c1c2cq, where ci{0,1}, the nonnegative integer ∑i=1q (q+1−i)ci is called the moment of w and is denoted by M(w). Let [w] denote the conjugacy class of w. Define M([w])={M(u): u[w]}, N(w)={M(u)−M(w): u[w]} and δ(w)=max{M(u)−M(v): u,v[w]}. Using these objects, we obtain equivalent conditions for a binary word to be an -word (respectively, a power of an -word). For instance, we prove that the following statements are equivalent for any binary word w with |w|2: (a) w is an -word, (b) δ(w)=|w|−1, (c) w is a cyclic balanced primitive word, (d) M([w]) is a set of |w| consecutive positive integers, (e) N(w) is a set of |w| consecutive integers and 0N(w), (f) w is primitive and [w]St. 相似文献