首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 125 毫秒
1.
用Java语言编写了一个最简单的Internet聊天室。程序分为Server和Client两部分。Server作为1个JavaApplication运行在WebServer上。Client方是1个Applet,当用户浏览WWW主页时能自动下载并运行ChatApplet。  相似文献   

2.
一种利用Java进行Web网络管理的技术策略的研究   总被引:1,自引:1,他引:0  
介绍了传统的网络管理模式和基于Web的3层网络管理模式的区别,讨论了如何利用Java技术实现Web网络管理的一种方法及其工作原理,举例说明了如何实现网络管理中的拓扑发现和报警推送的问题。  相似文献   

3.
Sun公司最新发布的Java Plug-in软件使得浏览器能直接用Sun公司自己的JRE来运行Web页面上的Java applets或JavaBeans组件。此文介绍了Java Plug-in的主要功能,讲述了Java Plug-in的原理,并详细地论述了如何在IE浏览器中实现Java Plug-in。  相似文献   

4.
HPWebJetAdmin是一个单一的基于网络的管理网络设备的工具。它为那些想要使用Web测览器去安装、管理、排除网络设备故障的网络管理员提供解决方案。通过Internet访问,可以在任何地方远程管理HPJetDirect连接的打印机,它的远程安装和管理功能可以消除管理员不必要的往返时间,节省网络管理员的时间。提高用户工作效率,降低总体拥有成本。此次最新推出的WebJetAdmin5.5具有如下此功能可识别网络上的设备和其有关的信息。WebJetAdmin可自动发现网络打印机并建立相应的数据库。…  相似文献   

5.
Sun公司最新发布的 Java Plug- in软件使得浏览器能直接用 Sun 公司自己的 JRE来运行 Web页面上的Java applets或 JavaBeans组件。本文介绍了Java Plug- in的主要功能,讲述了 Java Plug- in的原理,并详细地论述了如何在 IE和 Navigator浏览器中实现 Java Plug-in。  相似文献   

6.
JSP安装介绍     
在WindowsNT下安装JSP为了实验JSP技术,首先需要建立运行环境,这个过程相当简单:1、在http://javasun。com/jdk/处下载JDK(Java2SDK、Standard Edition。v12.2)。2、在http/javasun。com/products/jsp/处下载JSWDK(Java Server Web Development Kit 1.0.1)。安装JDK:JDK的安装是首先运行下载得到的jdk122-win.exe,然后修改系统环境参数.在PATH参数中加…  相似文献   

7.
Java在科学计算方面的并行处理   总被引:6,自引:0,他引:6  
讨论了Java和Web技术在科学和工程计算中的作用。应用三种大计算量问题,调查了Java作为高性能并行分布计算语言的可能性。Java将能够很好地成为科学和工程领域的主导语言。  相似文献   

8.
一种进行Web网络管理的技术策略   总被引:6,自引:1,他引:5  
首先对传统的网络管理模式和基于Web的网络管理模式进行比较,同时介绍了利用CORBA规范和Java技术Web网络管理的策略,最后,介绍了如何使用这种策略来实现Web网络管理的具体方法。  相似文献   

9.
基于Java/IIOP的Web数据库解决方案的设计   总被引:3,自引:0,他引:3  
讨论了Web的三层结构,对各种Web数据库技术和多种JDBC解决方案进行了比较,最后提出了一个使用Java/JDBC结合CORBA标准的IIOP协议的架构即基于Java/IIOP的Web数据库解决方案。  相似文献   

10.
本文探讨Java与JavaScript交叉调用技术及其在Web开发中的应用,与单独使用Java,JavaScript编程比较,该技术具有明显的优点。  相似文献   

11.
Charlotte: Metacomputing on the Web   总被引:3,自引:0,他引:3  
Parallel computing on local area networks is generally based on mechanisms that specifically target the properties of the local area network environment. However, these mechanisms do not effectively extend to wide area networks due to issues such as heterogeneity, security, and administrative boundaries. We present a system which enables application programmers to write parallel programs in Java and allows Java-capable browsers to execute parallel tasks. It comprises a virtual machine model which isolates the program from the execution environment, and a runtime system realizing this virtual machine on the Web. Load balancing and fault masking are transparently provided by the runtime system.  相似文献   

12.
Proposed applications for mobile code systems include autonomous shopping agents, autonomic systems, distributed sensor network applications, and interstellar space networks. I argue the case for mobile code systems as the next-generation distributed programming paradigm and discuss the security problems that must be addressed before this vision is practically realizable. The security discussion will focus on protecting mobile code programs that execute in the wild from malicious actions by remote hosts.  相似文献   

13.
《Computer》2003,36(10):14-16
Despite the promise, Web services present network administrators with a thorny problem: as network security becomes an increasing concern, Web services open up networks by letting outside users access databases, applications, and internal users. Traditional security techniques - such as virtual private networks or secure sockets layer (SSL) technology - cannot secure the large number of transactions that Web services can perform in a short time. Meanwhile, basic Web services transactions are unencrypted and unsecured, which creates the potential for disaster. It is thus important for Web services technology to have its own security mechanisms. In fact, industry observers have said the biggest obstacle to wider adoption of Web services has been security concerns. With this in mind, researchers are developing and implementing several Web services security approaches.  相似文献   

14.
Active networks-networks you can add programs to or customize to particular applications-are probably most familiar as Web proxy caches and firewalls. In their more sophisticated form, however, they have become customized infrastructures that let designers program control planes-the control software and network hardware used to manipulate the transport system's behavior. Programming mechanisms such as open signaling are becoming more widespread, for example. But research in active networks has taken a step beyond even these sophisticated infrastructures. Working systems now let designers modify packet-switching infrastructures on the fly using either a switch-like model, which mixes active packets with other packets, or in a capsule model, which regards all packets as programs. In surveying working systems and experimental results, the authors have found that first-generation systems have opted to use modern programming language technologies such as Caml and Java to provide usability and safety, and cryptographic techniques to provide security. The systems differ in the degree of flexibility and performance they offer. Many differences stem from the use of a particular security model. The paper discusses a general architecture for active networks  相似文献   

15.
Web Services是一种构建应用程序的应用实体,形成特定条件下的API;同时也是一个可互操作的分布式应用程序平台,并能在所有支持HTTP协议操作系统上实施运行。在网络中服务方提供了一个Web Services平台,该平台不仅提供相关的网络服务,而且会提供一种标准来描述它的服务;而客户可以在网络中其它任何一点调用该服务,并且可以得到足够的信息来得知如何调用。本文设计并开发一款基于Web Services技术的高考服务系统,即在移动终端开发客户端系统,并通过Web Services获取服务器提供的各种信息。在系统中采用多种算法完成模拟志愿填报、高校查询、学习计划等多种模块,并提供高考动态、工具娱乐、心理辅导等多种工具模块,能够帮助考生在高考过程中得到更好的发挥。  相似文献   

16.
基于移动Agent的Web服务组合执行框架设计   总被引:2,自引:0,他引:2  
周远长  钟勇  朱嘉鲁 《计算机应用》2006,26(10):2294-2286
对Web服务组合技术深入分析,从Web服务组合的控制执行层面入手,结合移动Agent的优势,提出一种基于移动Agent的Web服务组合执行框架。对于复杂Web服务组合,框架可将其分解成若干相互依赖的任务片,其中任务片对应一个线性的子Web服务组合,然后分配给多个移动Agent进行分布式执行。  相似文献   

17.
Web站点的故障转移群集的应用   总被引:4,自引:0,他引:4  
分析了故障转移群集的基本原理,运用“故障转移群集化”来规划网络,保证了Web站点的安全性和数据的可靠性,通过提供应用程序服务器中的冗余设计,来避免应用程序故障(可用性中断),并确保联机商业活动的安全性与可靠性。  相似文献   

18.
基于.NET的Web Services安全技术实现   总被引:1,自引:0,他引:1  
为解决在Web应用中应用程序调用Web服务的安全性,采用一种基于.NET身份验证和授权的Web服务安全技术策略,通过将会话标识进行传递,实现Web服务的安全调用,实现了Web服务安全性的一般要求。该策略不仅易于编程而且增强了Web服务的安全性,保护了业务应用程序之间交换消息的完整性和机密性。  相似文献   

19.
主动网络中的节点资源管理   总被引:6,自引:0,他引:6  
主动网络由于允许用户将主动应用插入主动节点运行,因而比传统的被动网络需要更多的资源。为了保证资源的共享和资源访问的安全性,对这些资源必须进行合理的分配、监视和管理。该文在分析主动网络与被动网络中资源管理差别的基础上,提出了主动节点资源管理方案,并在原型系统中实现了该方案。  相似文献   

20.
ProgramID     
Although systems engineers have developed powerful tools for measuring, modeling, and optimizing system performance, system security is much less well understood. This paper discusses the issue of system security in the context of Internet security and introduces a simple idea called ProgramID. ProgramID is an example of a strategy based on a principle we call think globally, act locally (TGAL), a general principle for distributed, decentralized management of networks. Under the TGAL principle, a combination of simple security strategies acting at a local level can produce measurable increases in global security. ProgramID can be implemented via a simple service that users can add to their operating system to force programs to identify themselves before they can execute. This gives individual computer users an extra layer of protection against malicious programs such as the increasingly prevalent email viruses. Using epidemic-like models, we analyze how global security is impacted when some fraction of Internet users have ProgramID protection.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号