共查询到20条相似文献,搜索用时 187 毫秒
1.
2.
智能家居系统如何接入Internet是一个难点问题。在对现有嵌入式系统连入Internet技术分析的基础上,结合嵌入式Internet技术、计算机网络技术、电力线数据通信技术,设计出一种高性价比的电力线载波智能家庭网关系统。最后给出了智能家庭网关系统的应用实例,实现了对智能家电的远程监控。 相似文献
3.
4.
5.
本文提出了一种基于嵌入式Linux的异构网络融合方案,设计了在嵌入式Linux平台上融合WLAN、WPAN、GPRS和Internet的无线接入设备的软硬件并进行了实现.针对设备中802.11b与蓝牙的干扰问题,提出了基于自适应跳频和协作模式的解决方案.最后搭建了异构网络融合实验系统,实验结果说明系统可以初步实现异构网络的融合. 相似文献
6.
7.
8.
Internet日益成为我们生活的一部分,无论程序员或编程爱好者,都会对网络编程有很大的兴趣,VC提供了非常方便的网络编程接口。该文通过一个例子介绍了如何用Windows Socket API来开发网络程序。一. Windows Socket API简介Socket是网络通信的基本构件,一个Socket对应于通信的一端,网络通信的Socket接口模型将通信主机或进程当作端点。每个网络对话包括两个端点:本地主机(或进程)和远地主机(或进程),Socket接口将网络对话的每个端点称为一个Socket。在网络应用中,多数网络应用程序是使用客户/服务器模型设计的。客户向服… 相似文献
9.
张鸿飞 《信息技术与信息化》2006,3(3):43-46
“帮助”是所有软件系统的重要功能。人们试图用各种各样的方法向用户提供帮助.以便使系统的学习和使用更加简单和方便。对于一些复杂的应用系统,特别是那些依赖于用户经验的系统。用户的经验知识能够为其他用户提供更有价值的帮助。在Web网络环境中,网络使得用户之间的互相帮助成为可能。文章分析了各种各样的帮助功能,以及帮助的实现过程。给出了Web环境中一种新颖的基于用户和计算机协作的智能帮助模型,最后在一个E-learning系统中进行了实验。 相似文献
10.
11.
12.
13.
Peer-to-Peer (P2P) computing is widely recognized as a promising paradigm for building next generation distributed applications. However, the autonomous, heterogeneous, and decentralized nature of participating peers introduces the following challenge for resource sharing: how to make peers profitable in the untrusted P2P environment? To address the problem, we present a self-policing and distributed approach by combining two models: PET, a personalized trust model, and M-CUBE, a multiple-currency based economic model, to lay a foundation for resource sharing in untrusted P2P computing environments. PET is a flexible trust model that can adapt to different requirements, and provides the solid support for the currency management in M-CUBE. M-CUBE provides a novel self-policing and quality-aware framework for the sharing of multiple resources, including both homogeneous and heterogeneous resources. We evaluate the efficacy and performance of this approach in the context of a real application, a peer-to-peer Web server sharing. Our results show that our approach is flexible enough to adapt to different situations and effective to make the system profitable, especially for systems with large scale. 相似文献
14.
Leonard 《Ad hoc Networks》2003,1(1):3-11
This paper takes us on a short journey from traditional desktop computing to the three emerging dimensions of: Nomadicity (the system support needed to provide a rich set of computing and communication capabilities and services to nomads as they move from place to place in a way that is transparent, integrated, convenient and adaptive); embeddedness (small intelligent devices embedded in the physical world and connected to the Internet); and ubiquity (Internet service availability wherever the nomad travels on a global basis). These three dimensions give us a powerful system that supports global access for mobile users interacting with smart spaces. When we add intelligence distributed across this global infrastructure, we form a new “space”, which is the basis of a vision I articulated for the Internet in 1969 and which has yet to be achieved. In that vision, I foresee that the Internet will essentially be an invisible global infrastructure serving as a global nervous system for the peoples and processes of this planet. 相似文献
15.
近似于人际关系网络,P2P文件共享交易存在着相互信任的问题.服务请求节点和服务提供节点是参与文件共享交易的两类实体,通过分析两者的信任关系,提出一种双向并发信任机制-BPTM.该信任机制研究交易双方的相互信任问题,并在此基础上建立服务选择信任模型和服务确认信任模型,实施信任关系评估的双向化.仿真与分析表明,BPTM相比传统的单向信任机制,在交易成功率上有较大的改进,可使节点之间更有效的建立互信关系. 相似文献
16.
Undercoffer Jeffrey Perich Filip Cedilnik Andrej Kagal Lalana Joshi Anupam 《Mobile Networks and Applications》2003,8(2):113-125
Security is paramount to the success of pervasive computing environments. The system presented in this paper provides a communications and security infrastructure that goes far in advancing the goal of anywhere-anytime computing. Our work securely enables clients to access and utilize services in heterogeneous networks. We provide a service registration and discovery mechanism implemented through a hierarchy of service management. The system is built upon a simplified Public Key Infrastructure that provides for authentication, non-repudiation, anti-playback, and access control. Smartcards are used as secure containers for digital certificates. The system is implemented in Java and we use Extensible Markup Language as the sole medium for communications and data exchange. Currently, we are solely dependent on a base set of access rights for our distributed trust model however, we are expanding the model to include the delegation of rights based upon a predefined policy. In our proposed expansion, instead of exclusively relying on predefined access rights, we have developed a flexible representation of trust information, in Prolog, that can model permissions, obligations, entitlements, and prohibitions. In this paper, we present the implementation of our system and describe the modifications to the design that are required to further enhance distributed trust. Our implementation is applicable to any distributed service infrastructure, whether the infrastructure is wired, mobile, or ad hoc. 相似文献
17.
王源 《中国电子科学研究院学报》2006,1(3):219-222
服务计算是一种新的分布式计算模式。在服务计算中,跨组织广域分布的资源共享对安全提出了极大的挑战,特别是资源的动态变化及应用安全需求的动态变化对安全提出的挑战。本文给出了服务计算的安全模型,分析了这种应用逻辑与安全策略分离的基于信任域的安全模型的主要思想和优点。该模型可为信息栅格安全构建提供一种有效的解决思路。 相似文献
18.
P2P网络中具有激励机制的信任管理研究 总被引:1,自引:0,他引:1
针对现有的信任模型不能很好地处理P2P网络环境中存在的不诚实推荐、协同作弊与复杂的策略性欺骗等问题,提出了一种具有激励效果的分布式P2P信任管理模型(IMTM),以量化和评估节点的可信程度,并给出了模型的数学表述和分布式实现方法。信任模型利用相似度函数构建的推荐可信度模型作为节点推荐的准确性度量,并充分考虑节点行为的稳定性、可信服务持续强度、风险性及信任的时间相关性等因素。除此之外,为了有效激励节点积极提供高质量的服务,惩罚不良行为节点,还提出一种基于节点信任度的激励机制。分析及仿真实验表明,与已有的信任模型相比,IMTM在抑制更广泛的恶意节点攻击行为中,表现出更好的适应性、灵敏性与有效性。 相似文献
19.