期刊文献+

网络虚拟环境中两运动物体安全避障互寻相遇的一种算法及实现 被引量:1

An Algorithm and Implementation of Two Moving Objects Find and Meet Each Other and Avoid Obstacle Safely in Network Virtual Environment
在线阅读 下载PDF
导出
摘要 文章提出了一种在网络虚拟环境中两运动物体安全避障互寻相遇的方法。已知两个运动物体的初始位置,通过碰撞检测算法、相互寻找算法以及相遇判定算法,判断两物体是否相遇,模拟两物体移动的路线,准确定位两物体的相遇地点并记录互寻路线图。该算法能够准确定位两运动物体相遇的位置,确定安全避障后相遇的路线。 The article puts forward a method to ifnd a path between two moving objects which can ifnd and meet each other and avoid obstacles safely in network virtual environment. Having known the initial positions of the two moving objects, with the collision detection algorithm, the ifnd-each-other algorithm and the meet-decision algorithm, the system can judge whether the two objects meet each other, and locate accurately the meeting place and record the route map by simulating the walking routes of the two objects. The algorithm can locate accurately the meeting position and look for the route effectively in network virtual environment.
出处 《信息网络安全》 2014年第2期37-40,共4页 Netinfo Security
基金 国家自然科学基金[61340019] 山东省自然科学基金[ZR2012FM029]
关键词 碰撞检测 相互寻找算法 相遇判定算法 安全避障 collision detection ifnd-each-other algorithm meet-decision algorithm avoid obstacle safely
  • 相关文献

参考文献10

二级参考文献35

共引文献97

同被引文献39

  • 1MellP, Grance T. The NIST definition of cloud computing (draft)[J].NIST special publication, 2011, 800(145):7-12.
  • 2ClarkB, Deshane T, Dow E M, et al. Xen and the Art of RepeatedResearch[C]//USENIX Annual Technical Conference, FPJEENIX Track.2004: 135-144.
  • 3KVM.Kernel based virtual machine[EB/OL] http://www.linux-kvm.org/page/Main一Page,2014-9-11.
  • 4PayneB D, De Carbone M D P, Lee W. Secure and flexible monitoringof virtual machines[C]//Computer Security Applications Conference,2007. ACSAC 2007. Twenty-Third Annual. IEEE, 2007: 385-397.
  • 5NanceK, Hay B, Bishop M. virtual machine introspection[J].IEEEComputer Society, 2008.
  • 6XiongH, Liu Z, Xu W, et al. Libvmi: A Library for Bridging theSemantic Gap between vip OS and VMM[C]//Computer andInformation Technology (CIT), 2012 IEEE 12th International Conferenceon. IEEE, 2012: 549-556.
  • 7WangY, Hu C, Li B. Vmdetector: a VMM-based platform to detecthidden process by multi-view comparison[C]//High-Assurance SystemsEngineering (HASE), 2011 IEEE 13th International Symposium on. IEEE,2011: 307-312.
  • 8Li tty L, Lagar-CavilJa H A, Lie D. Hypervisor Support for IdentifyingCovertly Executing Binaries[C]//USENIX Security Symposium. 2008:243-258.
  • 9TomlinsonA. Introduction to the TPM [M]//Smart Cards, Tokens,Security and Applications. New York: Spring US,2008:155-172.
  • 10SailerR, Zhang X,Jaeger T, et al. Design and Implementation of aTCG-based Integrity Measurement Architecture[C]//USENIX SecuritySymposium. 2004,13: 223-238.

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部