期刊文献+

移动商务的自适应资源调用动态平衡策略 被引量:2

An Adaptive Resource's Transfer Dynamic-balancing Based on Motion Commerce
在线阅读 下载PDF
导出
摘要 电子商务中通过无线移动终端设备访问链接Internet获取数据信息已经成为未来的发展方向。由于移动商务系统高可用性、可扩展性、容错性的要求,必然需要资源调用的动态平衡,这也是提高移动商务系统性能和资源有效利用率的关键技术。本文在分析和研究调用动态平衡策略的基础上,利用中间件提供的分布式对象技术,构建了一种基于移动商务资源调用的动态平衡模型,并在此环境下改进了自适应动态平衡算法,提出了一种自适应的资源调用动态平衡策略。 It has become the direction of the future development to use mobile equipment to interview Internet and to obtain information in the e-commerce. Resource's transfer dynamic-balanclng is the necessary requirement of high-availability, scalability and failover in mobile e-commerce system. Meanwhile it is a necessary technology for enhancing performance of mobile e-commerce platform system and improving the rate of resource use. The distributed object technology which the middleware provides is used in the paper, and this paper presents a resource's transfer dynamic-balancing model on the basis of analyzing and researching other dynamic balancing algorithms.The paper puts forward an adaptive resource's transfer dynamic balancing strategy by improving other dynamic balancing algorithms.
出处 《微计算机信息》 北大核心 2006年第02X期131-133,共3页 Control & Automation
关键词 资源调用 动态平衡 中间组件 自适应 状态检测 resource's transfer dynamic-balancing middleware self-adaptive condition detection
  • 相关文献

参考文献3

  • 1GeorgeCoulouris JeanDollimore TimKindberg.分布式系统概念与设计[M].北京:机械工业出版社,2004..
  • 2陈希林,肖明清.一种LabWindows/CVI与MATLAB混合编程的实现方法[J].微计算机信息,2005,21(1):43-44. 被引量:32
  • 3Cali F,Conti M,Gregori E.IEEE 802.11 protocol:Design and performance evaluation of an adaptive back of mechanism IEEE Journal on Selected Areas in Communications,2000,1 8(9):1774-1786.

二级参考文献1

  • 1LabWindows/CVI user manual.http://www.ni.com.

共引文献33

同被引文献8

  • 1沈颖,杨天怡.移动Ad Hoc网络的密钥管理机制[J].信息安全与通信保密,2004,26(12):57-59. 被引量:3
  • 2徐光伟,霍佳震,徐光远,曹奇英.基于角色授权的Ad Hoc网群密钥分配算法[J].计算机应用,2005,25(12):2768-2769. 被引量:2
  • 3David Patterson,Aaron Brown,Pete Broadwell,George Candea,Mike Chen,Recovery Oriented Computing (ROC):Motivation,Definition,Techniques,and Case Studies,Techical Report,UC Berkeley,2002.
  • 4G.Kar,A.Keller,S.Calo,Managing Application Services over Service Provider Networks:Architecture and Dependency Analysis,in Proceedings of the Seventh IEEE/IFIP Network Operations and Management Symposium(NOMS 2000),Honolulu,HI,2000.
  • 5A.Brown,D.Patterson,An Active Approach to Characterizing Dynamic Dependencies for Problem Determination in a Distributed Environment,in Seventh IFIP/IEEE International Symposium on Integrated Network Management,Seattle,WA,May 2001.
  • 6D.Heckerman,A Tutorial on Learning With Bayesian Networks,Technical Report MSR-TR-95-06,Microsoft Research,Nov.,1996.
  • 7A Khalili, J Katz,W A Arbaugh. Towards Secure Key Distribution in truly Ad Hoc Networks. [EB/OL]. University of Maryland, http://www. gta. ufrj. br/- eric/tese/artigos/id_ threshold, ps. gz, 2006.
  • 8N Asokan, Philip Ginzboorg. Key agreement in Ad hoc networks [J]. Computer Communications, 2000,23 (17) :1627- 1637.

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部