首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   22篇
  免费   2篇
化学工业   3篇
金属工艺   1篇
建筑科学   1篇
无线电   3篇
一般工业技术   1篇
自动化技术   15篇
  2018年   1篇
  2015年   1篇
  2013年   2篇
  2012年   3篇
  2010年   1篇
  2009年   1篇
  2008年   1篇
  2006年   1篇
  2003年   1篇
  2002年   2篇
  1993年   1篇
  1991年   1篇
  1989年   3篇
  1988年   4篇
  1986年   1篇
排序方式: 共有24条查询结果,搜索用时 15 毫秒
1.
Passive network monitoring is the basis for a multitude of systems that support the robust, efficient, and secure operation of modern computer networks. Emerging network monitoring applications are more demanding in terms of memory and CPU resources due to the increasingly complex analysis operations that are performed on the inspected traffic. At the same time, as the traffic throughput in modern network links increases, the CPU time that can be devoted for processing each network packet decreases. This leads to a growing demand for more efficient passive network monitoring systems in which runtime performance becomes a critical issue.In this paper we present locality buffering, a novel approach for improving the runtime performance of a large class of CPU and memory intensive passive monitoring applications, such as intrusion detection systems, traffic characterization applications, and NetFlow export probes. Using locality buffering, captured packets are being reordered by clustering packets with the same port number before they are delivered to the monitoring application. This results in improved code and data locality, and consequently, in an overall increase in the packet processing throughput and decrease in the packet loss rate. We have implemented locality buffering within the widely used libpcap packet capturing library, which allows existing monitoring applications to transparently benefit from the reordered packet stream without modifications. Our experimental evaluation shows that locality buffering improves significantly the performance of popular applications, such as the Snort IDS, which exhibits a 21% increase in the packet processing throughput and is able to handle 67% higher traffic rates without dropping any packets.  相似文献   
2.
A review is carried out on the characterisation and algorithmic implementation of an extended product-form approximation, based on the principle of maximum entropy (ME), for a wide class of arbitrary finite capacity open queueing network models (QNMs) with service and space priorities. A single server finite capacity GE/GE/1/N queue with R (R>1) distinct priority classes, compound Poisson arrival processes (CPPs) with geometrically distributed batches and generalised exponential (GE) service times is analysed via entropy maximisation, subject to suitable GE-type queueing theoretic constraints, under preemptive resume (PR) and head-of-line (HOL) scheduling rules combined with complete buffer sharing (CBS) and partial buffer sharing (PBS) management schemes stipulating a sequence of buffer thresholds {N=(N1,…,NR),0<NiNi−1,i=2,…,R}. The GE/GE/1/N queue is utilised, in conjunction with GE-type first two moment flow approximation formulae, as a cost-effective building block towards the establishment of a generic ME queue-by-queue decomposition algorithm for arbitrary open QNMs with space and service priorities under repetitive service blocking with random destination (RS-RD). Typical numerical results are included to illustrate the credibility of the ME algorithm against simulation for various network topologies and define experimentally pessimistic GE-type performance bounds. Remarks on the extensions of the ME algorithm to other types of blocking mechanisms, such as repetitive service blocking with fixed destination (RS-FD) and blocking-after-service (BAS), are included.  相似文献   
3.
Summary The principle of Minimum Relative Entropy (MRE), given fully decomposable subset and aggregate mean queue length, utilisation and flow-balance constraints, is used in conjunction with asymptotic connections to infinite capacity queues, to derive new analytic approximations for the conditional and marginal state probabilities of single class general closed queueing network models (QNMs) in the context of a multilevel variable aggregation scheme. The concept of subparallelism is applied to preserve the flow conservation and a universal MRE hierarchical decomposition algorithm is proposed for the approximate analysis of arbitrary closed queueing networks with single server queues and general service-times. Heuristic criteria towards an optimal coupling of network's units at each level of aggregation are suggested. As an illustration, the MRE algorithm is implemented iteratively by using the Generalised Exponential (GE) distributional model to approximate the service and asymptotic flow processes in the network. This algorithm captures the exact solution of separable queueing networks, while for general queueing networks it compares favourably against exact solutions and known approximations.This work is sponsored by the Science and Engineering Research Council (SERC), UK, under grant GR/F29271  相似文献   
4.
5.
A member of the ribonuclease A superfamily, human angiogenin (hAng) is a potent angiogenic factor. Heteronuclear NMR spectroscopy combined with induced‐fit docking revealed a dual binding mode for the most antiangiogenic compound of a series of ribofuranosyl pyrimidine nucleosides that strongly inhibit hAng's angiogenic activity in vivo. While modeling suggests the potential for simultaneous binding of the inhibitors at the active and cell‐binding sites, NMR studies indicate greater affinity for the cell‐binding site than for the active site. Additionally, molecular dynamics simulations at 100 ns confirmed the stability of binding at the cell‐binding site with the predicted protein–ligand interactions, in excellent agreement with the NMR data. This is the first time that a nucleoside inhibitor is reported to completely inhibit the angiogenic activity of hAng in vivo by exerting dual inhibitory activity on hAng, blocking both the entrance of hAng into the cell and its ribonucleolytic activity.  相似文献   
6.
An exposition is undertaken on the performance related security modelling and evaluation of a robotic mobile wireless ad hoc networks (RANETs) and associated tradeoffs. It is based on the discrete event simulation analysis of a stable open gated queueing network model with infinite capacity, arbitrary configuration and multiple classes of packets under first-come-first-served and head-of-line rules. In this context, a quantitative case study on the trade-offs between performance and the wired equivalent privacy (WEP) security/selective security protocol is explored, based on generalised exponential transmission times and bursty arrival traffic flows characterised by an Interrupted Compound Poisson Process. Typical numerical experiments are carried out to evaluate the adverse effect of WEP security/selective security on performance and for illustration purposes, assess the adoption of a dual CPU towards performance enhancement of the RANET. A discussion on other vital related aspects such as broadcasting/multicasting and fault localisation in RANETs and their synergy with cognitive radio ad hoc networks (CRAHNs) is included.  相似文献   
7.
Bio‐based, biodegradable in soil, as well as degradable polyethylene mulching films with pro‐oxidants, have been introduced in the market in an effort to deal with the serious problem of managing plastic waste streams generated from conventional mulching films. In a previous experimental investigation, a series of naturally degraded under water melon cultivation conditions linear low density polyethylene (LLDPE) mulching films with pro‐oxidants, buried in the field for 8.5 years, were recovered intact even though undergoing a continuous slow abiotic degradation in soil. The aim of the present article was to simulate the behavior of the LLDPE mulching films with pro‐oxidants under a much longer time‐scale (e.g. some decades). Toward this purpose, samples of LLDPE with pro‐oxidants film were artificially degraded to simulate severe degradation/fragmentation of these films while been buried in the soil for many years, following the end of the cultivation season. Further degradation of these severely degraded samples was investigated by burying them in the soil over a period of seven years. During this burial period, all degradation parameters and their evolution with time were measured. The artificially degraded LLDPE film samples with pro‐oxidants, in contrast to the naturally degraded film that remained intact for 8.5 years, were gradually transformed into tiny micro‐fragments in the soil. These fragments, through a continuing abiotic degradation process under natural soil conditions are eventually transformed into invisible micro‐fragments. The fate of these micro‐fragments and their long‐term impact to the environment and human health is unpredictable. © 2015 Wiley Periodicals, Inc. J. Appl. Polym. Sci. 2015 , 132, 42289.  相似文献   
8.
The method of entropy maximisation (MEM) is applied in a state space partitioning mode for the approximation of the joint stationary queue length distribution of an M/M/1/N queue with finite capacity, N( > 1), multiple and distinct classes of jobs, R( > 1), under a complete buffer sharing scheme and mixed service disciplines drawn from the first-come-first-served (FCFS), last-come-first-served with (LCFS-PR) or without (LCFS-NPR) preemption and processor sharing (PS) rules. The marginal and aggregate maximum entropy (ME) queue length distributions and the associated blocking probabilities per class are also determined. These ME results in conjunction with the first moments of the effective flows are used, as building blocks, in order to establish a new product-form approximation for arbitrary exponential open queueing networks with multiple classes of jobs under repetitive-service (RS) blocking with random destination (RD). It is verified that the ME approximation reduces to the exact truncated solution of open multi-class reversible queueing networks. Numerical experiments demonstrate a good accuracy level of ME statistics in relation to simulation. Moreover, recent extentions of MEM for arbitrary GE-type queueing networks with RS-RD blocking and multiple classes of jobs are presented.  相似文献   
9.
10.
The Guard Channel Scheme (GCS) and Handoff Queueing Scheme (HQS) are the popular and practical strategies to prioritize handoff calls in wireless cellular networks. A key issue of giving handoff calls the higher priority is how to achieve a tradeoff among the handoff call blocking probability, new call blocking probability and handoff delay. This paper extends GCS and HQS and presents an efficient handoff scheme that dynamically manages the channels reserved for handoff calls depending on the current status of the handoff queue. A three-dimensional Markov model is developed to analyze the performance of this scheme and investigate the desirable performance tradeoff. The Poisson process and Markov-Modulated-Poisson-Process (MMPP) are used to model the arrival processes of new and handoff calls, respectively. The accuracy of this model is evaluated through the extensive comparison of the analytical results to those obtained from discrete-event simulation experiments. Performance measures in terms of the mean number of calls in the system, aggregate response time, aggregate call blocking probability, handoff call blocking probability, new call blocking probability and handoff delay are evaluated. The analytical model is used to investigate the effects of the number of channels originally reserved for handoff calls, the number of dynamic channels, and the ratio of the rate of handover calls to the aggregate arrival rate on the system performance.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号